This article can also be found in the Premium Editorial Download "Information Security magazine: Comparing five of the top network-based inline IPS appliances."
Download it now to read this article plus other related content.
By Rolf Oppliger
Artech House, 503 pages, $99.95
In the increasingly large infosecurity bookshelf, few titles are considered best of breed. Contemporary Cryptography may well be the next classic reference
The chapters of Contemporary Cryptography brim with discrete mathematics, probability theory, information theory and formal algorithms. Although one would expect stilted language from a theoretical computer scientist, the reader is pleasantly surprised--the prose sparkles with clarity. The book takes a generalist approach with its four major sections: foundational mathematics, unkeyed cryptosystems, secret-key cryptosystems and public-key cryptosystems. The author anchors the text with meticulous footnotes and references.
Not only is Contemporary Cryptography comprehensive in scope, but the author ensures it's up to date by covering elliptical curve cryptography (ECC)--a theory basing the security of the encryption algorithm on the mathematically difficult task of computing discrete logarithms for an elliptical curve. The book provides the necessary mathematical foundations for ECC, and then returns to flesh out its application in formal algorithms. Other emerging cryptography concepts such as quantum cryptography are also covered, though the attention paid to them is roughly proportional to their current practical importance. More developed areas of cryptography, like traditional DES and RSA cryptosystems, are covered in more detail.
Although the core audience of cryptographic researchers and designers for Contemporary Cryptography is quite small, this phenomenal new entry to the cryptography field will find a place on the shelves of those more general infosecurity practitioners who are seeking a deep understanding of cryptography.
Visit SearchSecurity.com's Information Security Bookshelf for chapter downloads from these books and more.
Web Security, Privacy & Commerce, Second Edition
By Simson Garfinkel with Gene Spafford
The TCP/IP Guide
By Charles M. Kozierok
No Starch Press
The Little Black Book of Computer Security
By Joel Dubin
29th Street Press
Outsourcing Information Security
By C. Warren Axelrod
Sendmail Milters: A Guide for Fighting Spam
By Bryan Costales and Marcia Flynt
Phishing: Cutting the Identity Theft Line
By Rachael Lininger and Russell Dean Vines
John Wiley & Sons
Tell us what you think of our book reviews or the titles on our online bookshelf. Send your comments to firstname.lastname@example.org or enter your thoughts on SearchSecurity.com's Sound Off.
CISSP All-in-One Exam Guide, Second Edition by Shon Harris is an excellent source of security information--whether you take the test or not!
--L. Barry Lyons IV, IA Systems Engineer, Northrop Grumman
Download Chapter 5 of CISSP All-in-One Exam Guide, Second Edition
SearchSecurity.com's Information Security Bookshelf.
This was first published in October 2005