applied cryptography: protocols, algorithm, and source code in c: by bruce schneier. new york: john...

1
336 GOVERNMENT INFORMATION QUARTERLY Vol. 1 ~/NO. 311996 REVIEWS Applied Cryptography: Protocols, Algorithm, and Source Code in C. By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN O-471-59756-2. Reviewed by Peter Jorgensen, Instructional Technology Services, ASCIT, SUNY at Buffalo, Buffalo, New York 14260 <[email protected]>. The rapid growth of computer technology, especially the Internet, as the preferred method of transferring information has lead to a sudden increase in public awareness of the need for privacy and secrecy. In just a few years, we have moved from having to safeguard physical materials (e.g., checks, ledgers, currency, and gold bullion) to needing to protect electronic signals that not only travel on many unguarded public wires but can be detected as they escape from the confines of our computers into the ether. Security is no longer a matter of installing a sufficiently strong safe and entrusting the keys to a faithful armed guard. Security in the information age has become a matter of scrambling data in such a way that prevents unauthorized recipients from understanding it, yet allows authorized receivers to make use of it. In short, today’s secure information is encrypted. What this means, and how to go about achieving it, is central to Schneier’s excellent treatment of the art and science of cryptography. The book starts with a well-organized treatment of the concepts and basic strategies of encryption, the nature of random sequences, and protocols. On this foundation, Schneier builds his explanations of cryptographic techniques and, then, algorithms. He concludes with an examination of encryption in the real world, including many examples of implementations and political considerations and, finally, a wealth of source code for implementing many of the algorithms in C. In all, Applied Cryptography synthesizes a thorough and thoroughly readable account of this important topic from over 900 sources. A comprehensive index is included and diskettes (DOS) containing the source code examples listed in the book are available from the author for a minimal fee. Everyone, from those merely interested in the debate over secure Internet transactions to those responsible for protecting their institution’s confidential records, will benefit from this book. Nuremberg War Crimes Trials Online: A CD-ROM. By James Joseph Sanchez, Kelly Reed, Brian Peck, Valerie Caquias, and Vicky Bishop (co-compilers). Seattle, Washington: Aristarchus Knowledge Industries, 1995. 1 disc. $995.00. Reviewed by Maurie Caitlin Kelly, Documents, Maps, Microforms, and Curriculum Department, University Library, University of Illinois at Chicago. Box 8198, Chicago, Illinois 60680 <[email protected]>. The Nuremberg War Crimes Trials (NWCT) volumes are some of the most important historical documents of our century. The trials themselves and the philosophy under which they were held are the basis of international law, affect the conduct of war, and are particularly relevant in light of the recent conflict in Bosnia. The publishers state that the NWCT are “critical to an understanding of the form of the modern world system.“Through the creation of this CD-ROM, the publishers have made available all three sets of the trials and tribunal proceedings: The International Military Tribunal (IMT, the grey books), Nazi Conspiracy and Aggression (NCA, the red books), and Nuremberg Military Tribunal (NMT, the green books), as well as the Final Report to the Secretary of the Army (TTFR).

Upload: peter-jorgensen

Post on 17-Sep-2016

216 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2

336 GOVERNMENT INFORMATION QUARTERLY Vol. 1 ~/NO. 311996

REVIEWS

Applied Cryptography: Protocols, Algorithm, and Source Code in C. By Bruce Schneier. New

York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN O-471-59756-2.

Reviewed by Peter Jorgensen, Instructional Technology Services, ASCIT, SUNY at Buffalo, Buffalo, New York 14260 <[email protected]>.

The rapid growth of computer technology, especially the Internet, as the preferred method of transferring information has lead to a sudden increase in public awareness of the need for privacy

and secrecy. In just a few years, we have moved from having to safeguard physical materials (e.g., checks, ledgers, currency, and gold bullion) to needing to protect electronic signals that not only travel on many unguarded public wires but can be detected as they escape from the confines of our computers into the ether. Security is no longer a matter of installing a sufficiently strong safe and entrusting the keys to a faithful armed guard. Security in the information age

has become a matter of scrambling data in such a way that prevents unauthorized recipients from understanding it, yet allows authorized receivers to make use of it.

In short, today’s secure information is encrypted. What this means, and how to go about achieving it, is central to Schneier’s excellent treatment of the art and science of cryptography. The book starts with a well-organized treatment of the concepts and basic strategies of encryption, the

nature of random sequences, and protocols. On this foundation, Schneier builds his explanations of cryptographic techniques and, then, algorithms. He concludes with an examination of encryption in the real world, including many examples of implementations and political considerations and,

finally, a wealth of source code for implementing many of the algorithms in C. In all, Applied Cryptography synthesizes a thorough and thoroughly readable account of

this important topic from over 900 sources. A comprehensive index is included and diskettes (DOS) containing the source code examples listed in the book are available from the author

for a minimal fee. Everyone, from those merely interested in the debate over secure Internet transactions to those responsible for protecting their institution’s confidential records, will benefit from this book.

Nuremberg War Crimes Trials Online: A CD-ROM. By James Joseph Sanchez, Kelly Reed, Brian Peck, Valerie Caquias, and Vicky Bishop (co-compilers). Seattle, Washington: Aristarchus Knowledge Industries, 1995. 1 disc. $995.00.

Reviewed by Maurie Caitlin Kelly, Documents, Maps, Microforms, and Curriculum Department, University Library, University of Illinois at Chicago. Box 8198, Chicago, Illinois 60680 <[email protected]>.

The Nuremberg War Crimes Trials (NWCT) volumes are some of the most important historical documents of our century. The trials themselves and the philosophy under which they were held

are the basis of international law, affect the conduct of war, and are particularly relevant in light of the recent conflict in Bosnia. The publishers state that the NWCT are “critical to an understanding of the form of the modern world system.“Through the creation of this CD-ROM, the publishers have made available all three sets of the trials and tribunal proceedings: The International Military Tribunal (IMT, the grey books), Nazi Conspiracy and Aggression (NCA, the red books), and Nuremberg Military Tribunal (NMT, the green books), as well as the Final Report to the Secretary of the Army (TTFR).