Errata File (July 2000) Cryptography and Network Security: Principles and Practice, Second Edition William Stallings (Prentice-Hall, ISBN 0-13-869017-0) ------------------------------------------------------------------------- | ti = ith line from top; bi = ith line from bottom; Fi = Figure i | | X -> Y = replace X with Y; Ti = Table i | ------------------------------------------------------------------------- ------------------------------------------------------------------------- July list ------------------------------------------------------------------------- 72 t19: f -> F 82 t1: 8 bits in row -> 32 bits in row 116 t8: rounded up to x -> rounded up to x+1 136 T5.1: hostintermediate -> host-intermediate nodeintermediate -> node-intermediate 305 b2 and b4: C -> X ------------------------------------------------------------------------- May list ------------------------------------------------------------------------- 29 t20: (a = 0, b = 1, etc.) 36-37: Hill defined inconsistently; key matrix should always be in the same position (before or after the plaintext) 77 t16: m'(i+1) -> m'(i-1) 78 F3.10: upper right 000 -> 00 output of final f function should be 40 08 00 00 90 t1: 0, 1, 2,..., ((2^n) - 1) t2: 0 <= m < 2^n 91 b4: replace 0 <= w <= 2^(n-1) with 0 <= w <= 2^n - 1 98 b12: (N+1)/(n-1) -> (N+1)/(n+1) 105 Z7 = Z[97..112] Z37 = Z[37..52] 109 b8: entire encryption process -> entire decryption process 124 b19: RC5 -> RC2 125 b18: [j] -> K[j] change (( to ( everywhere on page 150 b13: by every integer -> by every odd integer 152 t10: {1, 5, 25,... -> {5, 25, ... 158 F5.15: Upper line between A and B should point from A to B Lower line between A and B should point from B to A b6: 5.14 -> 3.14 173 t20: block size is 2^k -> block size is k 174 4t: Equation 7.7 -> Equation 7.8 182 step 2: C^(re) -> C(r^e) 191 t2: q, a -> q, alpha 204 b12:i ;= 0 -> i := 0 215 Distributive law: [w * (x + y)]mod n = [(w * x)] + (w * y)]mod n 218 b2: two prime numbers -> two distinct prime numbers 220 3rd equation: plus sign should be multiply sign 221 Derivation just before Section 7.4 is incorrect, but the final equation is correct 225 t9: X3 divided by Y3 -> X3 divided by Y3, multiplied by Y3 227 (7.12): K -> k 234 t1: Pr[gcd(a,b =d] -> Pr[gcd(a,b)=d] t2: gcd(a/b, ... -> gcd(a/d, ... 235 7.11, STEP 1: Set C1 = 1 261 t22: hash of MAC -> hash or MAC 262 b5: b < n -> n < b 262 t4: L - 1 -> L 267 b1: left paren between minus sign and k 286 b3: original message -> original message mod 2^64 292 T9.6: RIPEMD-160 max msg size = ° 295 t3: opad = 01011100 297 t13: , by -> , on messages generated by 313 footnote: q is of order g mod p 314 t5: k (mod p) -> k (mod q) 315 Prob 10.7: such an increment -> such as increment bottom line of table: change A->B to B->A 316 b1: p-1 -> q-1 317 t1: p-1 -> q-1 328 b2: If the uses -> If the user 330 Table 11.1: steps 5 and 6 should be C to V and V to C repectively 332 message (4): K_c,tgs -> K_c,v 1st authenticator: TS_2 -> TS_3 335 msg (6): TGS - TGSrem; TS_b -> TS_6 337 T11.3c, messages 5 and 6: TGC -> V 341 b7: Initiator Unique Identifier -> Issuer Unique Identifier 346 F11.5.c, msg 2: second rB -> rA 347 t10: A's public key -> A's private key 350 b1: A(0, rA', B) -> A(0,rA', C) 353 indented text: Cn -> C_n (means C sub n) second piece of indented text: D_k[C_n} -> D_k[C_n] 368 F12.5: KRb -> Kub 369 F12.6: Public Key KRb -> Public Key KUa 383 T12.6, bottom right: reverse MUST and SHOULD in last sentence 395 b6: X12.17 -> X9.17 397 t14: G12 -> G9 398 b7: step G12.a -> step G9.a 422 b11: change first C to B 429 1st bullet: KCS -> PKCS 434 F13.13: End System X on left 443 T14.1, Threats&Integrity: no bullet before memory T14.1, row 4, column 2: bogus threats -> bogus requests 453 b3: public key -> private key 454 t6: public key -> private key 457 b4: delete final right parenthesis 470 F14.11: D = Decryption (RSA) 489 b4: R = 9.15 -> R = 9.6 ------------------------------------------------------------------------ | A current version of this file, named Errata-Security2e-mmyy, | | is available at WilliamStallings.com | ------------------------------------------------------------------------