communications security, this is the text. As well
conceptual background of cryptography and authentication,
overview coverage of specific security implementations,
Kerberos, PEM (Privacy Enhanced Mail), PGP (Pretty Good
IPsec, SSL (Secure Sockets Layer), AES (Advanced Encryption
and a variety of proprietary systems. Where many security
only UNIX examples, this one gives tips on Lotus Notes,
one is an introduction, with a brief primer on networking,
some reasonable content on malware, and basic security
one deals with cryptography. The foundational concepts
covered in chapter one. Symmetric encryption, in chapter
presented in terms of the operations of DES (Data Encryption
Standard), IDEA (International Data Encryption Algorithm),
Chapter four details the major modes of DES. The algorithms
number of hash functions and message digests are described
five. Asymmetric algorithms, such as RSA (Rivest-Shamir-Adleman)
and Diffie-Hellman, are explained
in chapter six, although one could wish
for just slightly more material, such as actual numeric
that might reach a wider audience. The number theory
basis of much of
modern encryption is provided as well, in chapter seven.
including a tiny bit on elliptic curves, is given in
two covers authentication. The general problems are
chapter nine. Chapter ten looks at the traditional means
authenticating people: something you know, have, or are.
problems in handshaking are reviewed in chapter eleven.
twelve describes some strong protocols for passwords.
three examines a number of security standards. Kerberos
whole chapters, since we are provided with not only concepts
actual packets: version 4 in thirteen and 5 in fourteen.
Key Infrastructure) terms, components, and mechanisms
are outlined in
chapter fifteen. The basic problems in real-time communications
security are delineated in chapter sixteen. Chapter seventeen
examines the authentication and encryption aspects of
chapter eighteen deals with key exchange packets. SSL
(Transport Layer Security) are described in chapter nineteen.
four concentrates on electronic mail. Chapter twenty
the major concerns and problems. Chapter twenty one discusses
S/MIME (Secure Multipurpose Internet Mail Extensions).
PGP is covered
in chapter twenty two.
five contains miscellaneous topics. Chapter twenty
at firewalls, twenty four at a variety of specific security
and twenty five at Web issues. Folklore, in chapter twenty
briefly lists a number of simple "best practices" that
generally part of formal security literature.
explanations are thorough and well written, with a
illuminates the material rather than obscuring it. The
of the book may be a bit odd at times (the explanation
theory comes only after the discussion of encryption
supports), but generally makes sense. (It is, sometimes,
later text has created chapters that are slightly out
of place.) The
end of chapter "homework" problems are well
thought out, and much
better than the usual reading completion test. If there
is a major
weakness in the book, it is that the level of detail
seems to vary
arbitrarily, and readers may find this frustrating. Overall,
this work provides a solid introduction and reference
security related topics and technologies.
copyright Robert M. Slade, 1996, 2002 BKNTWSEC.RVW 20021106