Items related to Network Security: Private Communication in a Public...

Network Security: Private Communication in a Public World

  • 3.93 out of 5 stars
    108 ratings by Goodreads
 
9780130614667: Network Security: Private Communication in a Public World

Synopsis

This witty, concisely-written guide to the latest advances in network security protocols provides a critical assessment of the state of network security protocols and mechanisms (what works, what doesn't, and why). It also explains the cryptographic algorithms on which most security systems depend, describes secure electronic mail standards, contrasts competing schemes, and more.

"synopsis" may belong to another edition of this title.

From the Publisher

A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. In this book the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems.

From the Inside Flap

It was a dark and stormy night. Somewhere in the distance a dog howled. A shiny object caught Alice's eye. A diamond cufflink! Only one person in the household could afford diamond cufflinks! So it was the butler, after all! Alice had to warn Bob. But how could she get a message to him without alerting the butler? If she phoned Bob, the butler might listen on an extension. If she sent a carrier pigeon out the window with the message taped to its feet, how would Bob know it was Alice that was sending the message and not Trudy attempting to frame the butler because he spurned her advances? That's what this book is about. Not much character development for Alice and Bob, we're afraid, nor do we really get to know the butler. But we do discuss how to communicate securely over an insecure medium.

What do we mean by communicating securely? Alice should be able to send a message to Bob that only Bob can understand, even though Alice can't avoid having others see what she sends. When Bob receives a message, he should be able to know for certain that it was Alice who sent the message, and that nobody tampered with the contents of the message in the time between when Alice launched the message and Bob received it.

What do we mean by an insecure medium? Well, in some dictionary or another, under the definition of "insecure medium" should be a picture of the Internet. The world is evolving towards interconnecting every computer, and people talk about connecting household appliances as well, all into some wonderful global internetwork. How wonderful! You'd be able to send electronic mail to anyone in the world.

You'd also be able to control your nuclear power plant with simple commands sent across the network while you were vacationing in Fiji. Or sunny Libya. Or historic Iraq. Inside the network the world is scary. There are links that eavesdroppers can listen in on. Information needs to be forwarded through packet switches, and these switches can be reprogrammed to listen to or modify data in transit. The situation might seem hopeless, but we may yet be saved by the magic of mathematics, and in particular cryptography, which can take a message and transform it into a bunch of numbers known as ciphertext. The ciphertext is unintelligible gibberish except to someone who knows the secret to reversing the transformation. Cryptography allows us to disguise our data so that eavesdroppers gain no information from listening to the information as transmitted.

Cryptography also allows us to create an unforgeable message and protect it from being modified in transit. One method of accomplishing this is with a digital signature, a number associated with a message and its sender that can be verified as authentic by others, but can only be generated by the sender. This should seem astonishing. How can there be a number which you can verify but not generate? A person's handwritten signature can (more or less) only be generated by that person, though it can be verified by others. But it would seem as if a number shouldn't be hard to generate, especially if it can be verified. Theoretically you could generate someone's signature by trying lots of numbers and testing each one until one passed the verification test. But with the size of the numbers used, it would take too much compute time (for instance, several universe lifetimes) to generate the signature that way. So a digital signature has the same property as a handwritten signature, in that it can only be generated by one person. But a digital signature does more than a handwritten signature.

Since the digital signature depends on the contents of the message, if someone alters the message the signature will no longer be correct and the tampering will be detected. This will all become clear if you read Chapter 2 Introduction to Cryptography.

Cryptography is a major theme in this book, not because cryptography is intrinsically interesting (which it is), but because the security features people want in a computer network can best be provided through cryptography.

1.1. Roadmap to the Book The book is divided into three main sections.

Cryptography.

Chapter 2 Introduction to Cryptography is the only part of the cryptography section of the book essential for understanding the rest of the book, since it explains the generic properties of secret key, message digest, and public key algorithms, and how each is used. We've tried our best to make the descriptions of the actual cryptographic algorithms nonthreatening yet thorough, and to give intuition into why they work. It's intended to be readable by anyone, not just graduate students in mathematics. Never once do we use the term lemma. We do hope you read.

Chapter 3 Secret Key Cryptography, Chapter 4 Hashes and Message Digests, and Chapter 5 Public Key Algorithms which give the details of the popular standards, but it's also OK to skip them and save them for later, or just for reference. For you math types who would have noticed that we skipped a number if we didn't mention it, Chapter 6 Number Theory gives a deeper treatment of the mathematics behind the cryptography.

Authentication.

Chapter 7 Authentication Systems introduces the general issues involved in proving your identity across a network.

Chapter 8 Authentication of People deals with the special circumstances when the device proving its identity is a human being.

Chapter 9 Security Handshake Pitfalls deals with the details of authentication handshakes. There are many security flaws that keep getting designed into protocols. This chapter attempts to describe variations of authentication handshakes and their relative security and performance strengths. We end the chapter with a checklist of security attacks, so that someone designing a protocol can specifically check their protocol for these flaws.

Chapter 10 Kerberos V4 and Chapter 11 Kerberos V5 describe the details of those authentication systems. Secure electronic mail. Chapter 12 Electronic Mail Security describes the various types of security features one might want, and how they might be provided. Chapter 13 Privacy Enhanced Mail (PEM), Chapter 14 PGP (Pretty Good Privacy), and Chapter 15 X.400 describe three mail standards which are compared in Chapter 16 A Comparison of PEM, PGP, and X.400. There are two chapters that aren't in any of the three main sections. The first chapter (the one you're reading now) gives a whirlwind tour of computer networking and computer security to set the stage for the main focus of the book-computer network security. The final chapter, Chapter 17 More Security Systems, describes a variety of security systems, including Novell NetWare (Versions 3 and 4), Lotus Notes, DCE, KryptoKnight/NetSP, Clipper, SNMP, DASS/SPX, and sabotage-proof routing protocols.

1.2. What type of book is this?

We believe the reason most computer science is hard to understand is because of jargon and irrelevant details. When people work with something long enough they invent their own language, come up with some meta-architectural framework or other, and forget that the rest of the world doesn't talk or think that way. We intend this book to be reader-friendly. We try to extract the concepts and ignore the meta-architectural framework, since whatever a meta-architectural framework is, it's irrelevant to what something does and how it works.

We believe someone who is a relative novice to the field ought to be able to read this book. But readability doesn't mean "lack of technical depth". We try to go beyond the information one might find in specifications. The goal is not just to describe exactly how the various standards and de facto standards work, but to explain why they are the way they are, why some protocols designed for similar purposes are different, and the implications of the design decisions. Sometimes engineering tradeoffs were made.

Sometimes the designers could have made better choices (they are human after all), in which case we explain how the protocol could have been better. This analysis should make it easier to understand the current protocols, and aid in design of future protocols.

The primary audience for this book is engineers, especially those who might need to evaluate the security of or add security features to a distributed system, but the book is also intended to be useable as a textbook, either on the advanced undergraduate or graduate level. Most of the chapters have homework problems at the end.

1.3. Terminology

Any field with science in its name isn't.

Tony Lauck

Computer science is filled with ill-defined terminology used by different authors in conflicting ways, often by the same author in conflicting ways. We apologize in advance for probably being guilty sometimes ourselves. Some people take terminology very seriously, and once they start to use a certain word in a certain way, are extremely offended if the rest of the world does not follow.

When I use a word, it means j

"About this title" may belong to another edition of this title.

  • PublisherPrentice Hall
  • Publication date1995
  • ISBN 10 0130614661
  • ISBN 13 9780130614667
  • BindingTextbook Binding
  • LanguageEnglish
  • Edition number1
  • Number of pages504
  • Rating
    • 3.93 out of 5 stars
      108 ratings by Goodreads

Buy Used

Condition: Very Good
May have limited writing in cover... View this item

Shipping: FREE
Within U.S.A.

Destination, rates & speeds

Add to basket

Other Popular Editions of the Same Title

Search results for Network Security: Private Communication in a Public...

Stock Image

Kaufman, Charles
Published by Prentice Hall PTR, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used Hardcover

Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.12. Seller Inventory # G0130614661I4N00

Contact seller

Buy Used

US$ 6.40
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Kaufman, Charlie, Perlman, Radia, Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used Hardcover

Seller: Wonder Book, Frederick, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Like New condition. Hardcover edition. A near perfect copy that may have very minor cosmetic defects. Seller Inventory # M02B-03126

Contact seller

Buy Used

US$ 6.74
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Kaufman, Charlie, Perlman, Radia, Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used

Seller: Wonder Book, Frederick, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Seller Inventory # K04D-01314

Contact seller

Buy Used

US$ 6.74
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Kaufman, Charlie; Perlman, Radia; Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used First Edition

Seller: The Maryland Book Bank, Baltimore, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

textbook. Condition: Very Good. First Edition. Used - Very Good. Seller Inventory # 3-PP-4-0113

Contact seller

Buy Used

US$ 2.71
Convert currency
Shipping: US$ 4.20
Within U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used Hardcover

Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Hardback. Condition: Fine. Seller Inventory # GOR013401890

Contact seller

Buy Used

US$ 2.99
Convert currency
Shipping: US$ 7.43
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used Hardcover

Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Hardback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR001454885

Contact seller

Buy Used

US$ 2.99
Convert currency
Shipping: US$ 7.43
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

-
Published by -
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used

Seller: AwesomeBooks, Wallingford, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Textbook Binding. Condition: Very Good. Secure Networking: Cryptography, Protocols and Algorithms (Prentice Hall Series in Computer Networking and Distributed) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Seller Inventory # 7719-9780130614667

Contact seller

Buy Used

US$ 6.33
Convert currency
Shipping: US$ 6.62
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Charlie Kaufman, Radia Perlman, Mike Speciner
Published by Prentice Hall March 1995, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used Hardcover

Seller: Isle of Books, Bozeman, MT, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Hardcover. Condition: Good. Seller Inventory # 436545

Contact seller

Buy Used

US$ 13.00
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Kaufman, Charlie; Perlman, Radia; Speciner, Mike"
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
New First Edition

Seller: BooksByLisa, Highland Park, IL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

No Binding. Condition: New. Dust Jacket Condition: New. First Edition. PHOTO AND VIDEO OF PAGES TAKEN TO SHOW CONDITION PRIOR TO SHIPPING; . PHOTOS EMAILED FOR MORE SPECIFICS WHEN REQUESTED; Book. Seller Inventory # 264

Contact seller

Buy New

US$ 14.45
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Kaufman, Charlie; Perlman, Radia; Speciner, Mike
Published by Prentice Hall, 1995
ISBN 10: 0130614661 ISBN 13: 9780130614667
Used

Seller: Lexington Books Inc, Idaho Falls, ID, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Textbook Binding. Condition: Very Good. Contents are tight and clean. Seller Inventory # 064593

Contact seller

Buy Used

US$ 9.75
Convert currency
Shipping: US$ 5.75
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

There are 6 more copies of this book

View all search results for this book