The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Stopping with this site

I am stopping with this site. If you want to take over the site with domain name get in touch, e-mail address below.

Book details of 'Cryptography and Public Key Infrastructure on the Internet'

Cover of Cryptography and Public Key Infrastructure on the Internet
TitleCryptography and Public Key Infrastructure on the Internet
Author(s)Klaus Schmeh
PublishedJune 2003
PublisherJohn Wiley & Sons
Web links for this book
Search at
Wikipedia booksources
Shop for this book
As an Amazon Associate I earn from qualifying purchases

Back to shelf Computer security
Back to shelf Privacy

Score: score: 3.3 ***--  Vote for this book

The Virtual Bookcase Reviews of 'Cryptography and Public Key Infrastructure on the Internet':

Reviewer Rob Slade wrote:
Part one is supposed to address the question of why you would want to use cryptography on the Internet. Chapter one is really a general introduction or preface to the book. Chapter two tells us that cryptography is important for security. The ability to sniff various types of communications channels is mentioned in chapter three. Part two introduces the basic principles of cryptography. Chapter four outlines basic cryptographic operations, but only in the sense of listing the basic terms: the explanations are very limited. Some details of the internal operations of DES (Data Encryption Standard), IDEA (International Data Encryption Algorithm), and AES (Advanced Encryption Standard) are presented in chapter five, but not in a way that provides a full understanding of the systems. Chapter six looks at some of the math involved in asymmetric algorithms and describes the Diffie-Hellman and RSA algorithms, but not how they work in practice. Chapter seven says that digital signatures work, but not how. Hash functions are reviewed in chapter eight. Pseudo-random number generators and stream ciphers are the topic of chapter nine. Part three ostensibly moves to advanced cryptography. But the topics are ill-chosen and oddly grouped: chapter ten lists standards and standards bodies, eleven looks at DES modes and RSA data transforms, twelve outlines both communications protocols and attacks on cryptography. Authentication is covered in a reasonable manner in chapter thirteen, while a great deal of the math (and very little explanation) of elliptic curve cryptography (ECC) is given in fourteen, and fifteen deals with cryptographic hardware, software, and interfaces. Part four turns to public key infrastructures (PKI). Chapters sixteen and seventeen outline the elements of a PKI. Certificates and certificate servers are covered in eighteen and nineteen, respectively. Chapter twenty reviews practical aspects. Part five addresses cryptographic protocols for the Internet. Chapter twenty-one looks at the OSI (Open Systems Interconnection) layered model, with twenty-two examining protocols for layer 2, twenty-three for 3 (limited to IPSec), twenty-four for 4, and twenty-five, -six, - seven, and -eight for layer 7. (Only fair, since the TCP/IP application layer subsumes the OSI session, presentation, and application.) Part six covers more about cryptography, and is probably the best section of the book. Chapter twenty-nine deals with political aspects of cryptography, such as export restrictions. People, companies, and organizations are listed in chapter thirty. References and resources are in chapter thirty-one, for those who want to study the topic further. Chapter thirty-two finishes off with flops, myths, and snake oil. The writing is ragged, the structure often odd, and the technical level very inconsistent. Material seems to have been added with no particular purpose in mind. The chapter on random numbers starts out with a mention of three movies, two of which have tenuous connections to cryptography, none of which deals with the concept of randomness. Technical details are thrown into the text without either fully explaining the technology under discussion, or being necessary for further topics. The result is a grab bag of indiscriminate facts that do not furnish the reader with a full understanding of the topics. copyright Robert M. Slade, 2005

Add my review for Cryptography and Public Key Infrastructure on the Internet

Book description:

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the internet are and how cryptography can help * Includes a chapter on interception which is unique amongst competing books in this field * Explains Public Key Infrastructures (PKIs) - currently the most important issue when using cryptography in a large organisation * Includes up-to-date referencing of people, organisations, books and Web sites and the latest information about recent acts and standards affecting encryption practice * Tackles the practical issues such as the difference between SSL and IPSec, which companies are active on the market and where to get further information

Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2022 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement