Errata File (January 1998) NETWORK AND INTERNETWORK SECURITY (Prentice-Hall, 1995, ISBN 0-02-415483-0) William Stallings ti = ith line from top; bi = ith line from bottom; Fi = Figure i X -> Y = replace X with Y Ti = Table i ------------------------------------------------------------------------- January list ------------------------------------------------------------------------- 324 Message (4), line 2: message (2) -> message (4) 351 b8: Figure 2.14 -> Figure 2.15 407 Table 9.7: entry for 44 = s ------------------------------------------------------------------------- December list ------------------------------------------------------------------------- 9 F14.3, under Fabrication: Integrity -> Authenticity 17 F1.5: There should be arrows from MD5 to PEM and PGP 29 Second line marked "plain": insert t after s Second line marked "cipher": insert T after S 42 t18: 64 should be 128 47 t8-9: permutations -> substitutions t9: permutation -> substitution 56 t2: 264 should be 2^64 (2 to the 64) 68 b5: 1/64 -> 1/(2^64) b4: n/64 -> n/(2^64) 71 t1: 8;8 -> 8:8 73 Problem 2.10, first line: Insert "n, and let" after "length" Problem 2.10b: Replace "N - k" with "N - t" 81 Append to Figure 3.3 caption: Figure provided by Robert W. Shirey, The MITRE Corporation 96 t1: Replace tions with functions 99 t16: Replace b with c t19: should be {1, 5, 25, 29, 17, 21, 9, 13, 1, etc.} 104 b5: Replace "m-1 is not divisible by k" with "gcd(k,m-1) = 1 112 t10: Replace a plaintext with an 122 t19: 4.6 instead of 4.7 126 F4.9 caption: a subscript b should be a superscript b 127 1st line: Replace p with n 12th line: Replace first occurrence of p with n 134 b4: Replace ys with keys 142 Table 4.4: Replace 1950 with 1951 143 b7: should read 192 = 2^6 * 3^1 b5: should read gcd(18,192) = 2^1 * 3^1 147 Equation 4.2: Replace "if a, n relatively prime" with "if n is prime and n does not divide integer a" Equation 4.3: Replace "if a, n relatively prime" with "if n is prime and a is an integer" 147 Equation 4.6: Add "+1" to both exponents; should be m mod n 148 b16: delete line ending in "1 mod n" 150 2nd line: Replace x with n 154 b5: Replace by S[i] with by a[i] 164 Table 5.1, b4: KUb -> KUa 165 t7: Replace subscript K' with subscript K 167 Table 5.2b, first line: missing ")" after the second M 171 b10: Interchange MAC and M (2 times) b9: Replace M by MAC (2 times) b2: Interchange MAC and M 172 t3: Interchange MAC and M 176 F5.7: second column last entry "C sub 2" instead of "C sub 1" 177 t2: Replace or with of t7: Replace 2.14 with 2.15 Second line: First XOR should be an equal sign 184 t10: Replace has with his 190 t23: Section 3 -> Section 3.3 194 End of line 4: Replace E_KR_aA with E_KR_a 203 t2: k^365 -> 365^k 215 t13: Replace routing with routine. 247 t7: Replace black with solid blue 263 Problem 6.1 line 7: KRa instead of KUa, both times 268 F7.1, top arrow: Label should be: L * 512 bits = N * 32 bits 270 F7.2: Replace pair of dots in each oval with left arrow 271 Table 7.1b: should be T[35] = 6D9D6122 273 F7.4: Four times, replace T[i] by T[i]) 274 t2: 16 -> 4 t3: 17th -> 5th 295 F7.15, Receiver B's security device: Replace KUA with KUB 305 b13: Replace M with P 306 F7.17 "Calculate D": Replace 4 with 4Q 307 t12: Replace mod N with mod S(N) 312 t18: +1 should be subscript 313 t6: Legendre symbols mistyped 322 Table 8.1c(5): Replace TGS with K 330 Table 8.3 (2):replace K->C with AS->C Table 8.3 (2):replace Times || || with || Times || 341 B1: user i -> user j 356 Table 8.6 (a), 2nd line: 1 under 2 Table 8.6 (b), 2nd line: 12 under 11 Table 8.6 (d), 2nd line: 11 under 2 Table 8.6 (f), 2nd line: 14 under 17 358 End of line 3: Add p after mod 359 b4: Parenthesis around HM + xr 376 Step 2, line 4: Replace radix-64 with hexadecimal 401 t17: Replace Certificate with ID 411 t5: Should be rseed <- rbuf XOR dtbuf 432 Block in middle: Second line should be authDigest <- partyAuthPrivate.a 408 Replace t5 through t12 with: For example, the radix-64 sequence 01001001 00110001 01111001 01010010 interpreted as ASCII (with no parity) is the sequence "I1yR". t15: hex code should be 235C91 409 t10: Replace buffer or with buffer of t15: Replace buffe0r with buffer 446 Private Key: Replace "a symmetric" with "an asymmetric" Public Key: Replace "a symmetric" with "an asymmetric" 455 b11: Replace Macmillan with Prentice Hall b13: Replace Macmillan with Prentice Hall 453 Add: MUFT89 Muftic, S. Security Mechanisms for Computer Networks. New York: Ellis Horwood, 1989. 456 WOO92b: Replace April with March ------------------------------------------------------------------------- | A current version of this file, named Errata-Security-mmyy, is available| | via the web at http://www.shore.net/~ws | -------------------------------------------------------------------------