>From *Internet Security*
International Research Journal on Security
Safety and Protection of Datacommunications
on the Internet
New book release
For all of you interested in new book releases
of relevance and importance to the subscribers
of this list.
Title: Network Security,
Private Communication in a Public World
Authors: Charlie Kaufman, Radia Perlman, Mike Speciner
Released: April 1995
Publisher: Prentice Hall
Series: Computer Networking and Distributed Systems
Pages: 504 (exact)
Cryptography - Authentication - Electronic Mail
Price: $ 46
The introduction chapter deals with issues as Primer on Networking,
Tempest, Firewalls/Security Gateways, Key Escrow, Viruses, Worms.
Trojans, the Military model of security, and some legal issues.
The Firewalls/Security Gateways chapter deals with packet filters,
encrypted tunnels, and goes into application level gateway.
A sizeable chunk of the book is devoted to cryptography with sub-
chapters on breaking, secret key crypto, public key crypto and
hash algorithms. A good overview of DES with some new ways of
approaching double encryption and triple encryption with thesame and
with different keys. Hashes and message digests are covered with
subs on MD2/MD4 and MD5, and some notes on SHS Padding.
The public key algorithms are described in chapter 5. RSA, DH, DSS
fly by - (a bit too fast for such important topics, but that's a
matter of taste). Surprisingly this book is one of the few that
stores correctly Zero Knowledge Proof Systems under Public Key
Algorithms. A chapter on Number Theory finalizes the first part.
The authentication part starts with Systems, logically deals with
Authentication of People, and describes Security Handshake Pitfalls.
Kerberos V4 and V5 are discussed in depth. Good chapters are Evading
Password Guessing Attacks and Double TGT Authentication, among the many.
Electronic Mail Security is covered extensively. PEM (Privacy Enhanced
Mail) and PGP are placed well on the map, though the latter deserves
more technical description. A chapter on X400 and the security functions
possible is a nice touch. A comparison of PEM, PGP and X400 is
offered that is useful for those in doubt. A leftover chapter features
NetWare, KryptoKnight, SNMP, DASS/SPX, Lotus Notes, DCE and Microsoft
LAN manager. Some thoughts about the Clipper chip conclude the chapter.
Critique: Words as canonicalization (in relation to PEM) are not in my
version of Webster, and might appear somewhat off track for the serious
reader. The Firewalls chapter should in a next edition be more up to
Overall evaluation: A good book, modestly priced, a lot of information
for the dollar. Not for the casual reader, really. But if one feels
comfortable with the issues, one appreciates the authors'
efforts to put it all to paper. If you're in network security, you'll
likely want to have it in your room, instead of in the library.
[ if you would like to receive a free of charge trial copy of our
monthly journal, and you haven't requested one, yet, please send
your name and surface address information to
com or the address below. We'd be happy to
accommodate you. ]
| Internet Security
| Monthly International Research Journal on
| Datacommunications and Network Security
| Suite 400, 1825 I Street NW, Washington DC 20006
| United States
| Telephone +1 202 775 4947 - Fax +1 202 429 9574
| Internet: nso @