Category: Cryptography

REVIEW: The Reader of Gentlemen’s Mail. Herbert O. Yardley and the Birth of American Intelligence

books

By David Kahn. New Haven, CT: Yale University Press, 2004. 242 pages Few authors have so successfully mined the history of codebreaking. In Kahn's latest book, he explores the life and times of Herbert Yardley, one of the forgotten figures of U.S. intelligence. Yardley's achievements had less to do with his talents as a cryptanalyst,

REVIEW: Cryptography Decrypted

cryptode

by H. X. Mel/Doris Baker, 2001, Addison-Wesley Publishing Co. , 352 p. ______________________________________________________________________________________________________________________________ The book seems to be rather ambitious, since the preface says that it is addressed to any (and therefore all) audience(s), without any limitation on the stated purpose. In general, it is an attempt to portray the basic concepts of cryptography, without

Review: Handbook of Applied Cryptography

712PCANXHYL

by Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. CRC Press ___________________________________________________________________________________________________________________________ The Scenario CRC Press has been building a series of books on discrete mathematics and its applications. Doug Stinson wrote the theory book on cryptography (Cryptography: Theory and Practice (ISBN: 0-8493-8521-0, if you don't like this book you'll vomit when you

REVIEW: Internet Cryptography

9780201924800

by Richard E. Smith, Publisher: Addison-Wesley Professional, Copyright 1997 _______________________________________________________________ According to the preface, this book is aimed at non-specialists who need to know just enough about cryptography to make informed technical decisions. As an example, Smith suggests systems administrators and managers who, while not formally charged with security, still have to use cryptographic techniques

REVIEW: Practical Cryptography

Practical-Cryptography-9780471228943

by Bruce Schneier/Niels Ferguson. Wiley, Apr 3, 2003 – 410 pages ___________________________________________________________________________________________   The preface points out that cryptography has done more harm than good in terms of securing information systems, not because cryptography fails in and of itself, but, rather, due to the improper use or implementation of the technology.  This book is intended

REVIEW: Brute Force: Cracking the Data Encryption Standard

brute force

By Matt Curtin Springer, 2005 ISBN: 0387201092   Reviewed by Ben Rothke ____________________________________________________________ Brute Force: Cracking the Data Encryption Standard is the story of the life and death of DES (data encryption standard). In the early 1970s, the U.S. government put out an open call for a new, stronger encryption algorithm that would be made

REVIEW: Malicious Cryptography: Exposing Cryptovirology

crypto

  by Adam L. Young/Moti Yung, John Wiley & Sons, Inc. 2004 ___________________________________________________________________________________ Both the foreword and the introduction are turgid, and bloated with excessive verbiage, while never giving a clear indication of what the book is actually about.  Does it have to do with viruses at all?  Is it about the use of cryptography

REVIEW: Modern Cryptography: Theory and Practice

205908-200x200

by Wenbo Mao, 2004, 0-13-066943-1, U$54.99/C$82.99 ___________________________________________________________________________________________________________   A "Short Description of the Book" states that it is intended to address the issue of whether various crypto algorithms are "practical," as opposed to just theoretically strong.  This seems odd, since no algorithm is ready for implementation as such: it must be made part of a

REVIEW: Cryptography and Network Security: Principles and Practice. 2nd edition

41VAZ25YR3L._SL500_AA300_

by William Stallings. Prentice Hall. 1999. 569 pages. Appendix, glossary, bibliography, index. $73.00 ISBN 0-13-869017-0 LoC TK5105.59.S713 reviewed by Bob Bruen —————————————————————————————————————————————————————– This textbook is a second edition of Network and Internetwork Security: Principles and Practice (1995) which was reviewed here just about three years ago. This edition is a substantial update of the first