home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Telecom
/
1996-04-telecom-walnutcreek.iso
/
book.reviews
/
top.secret.data.encrypt
< prev
next >
Wrap
Text File
|
1995-01-05
|
2KB
|
56 lines
=========================================================================
Date: Thu, 1 Sep 1994 00:07:00 CDT
Reply-To: TK0JUT2@MVS.CSO.NIU.EDU
Sender: CU-DIGEST list <CUDIGEST%UIUCVMD.bitnet@vm42.cso.uiuc.edu>
From: "Cu Digest (tk0jut2@mvs.cso.niu.edu)"
<TK0JUT2%NIU.bitnet@vm42.cso.uiuc.edu>
Subject: Cu Digest, #6.78
CONTENTS, #6.78 (Wed, Aug 31, 1994)
File 4--"Top Secret Data Encryption Techniques" by Held
------------------------------
Date: Tue, 30 Aug 1994 11:52:53 -0600 (MDT)
From: "Rob Slade, Ed. DECrypt & ComNet, VARUG rep, 604-984-4067"
Subject: File 4--"Top Secret Data Encryption Techniques" by Held
BKTSDET.RVW 940712
SAMS Publishing
11711 N. College Ave., Suite 140
Carmel, IN 46032-5634
317-573-2500
317-581-3535
800-428-5331
800-428-3804
hayden@hayden.com
haydenbks@aol.com
76350.3014@compuserve.com
"Top Secret Data Encryption Techniques", Held, 1993, 0-672-30293-4,
U$24.95/C$31.95
This book is a lot of fun, and may even be of some use. A number of
ciphering techniques are outlined, and the interested hobbyist can
undoubtedly come up with many variations on the themes. The included
source code, in BASIC, is simple and straightforward, and can easily
be modified to suit new ideas.
Fun, and possibly useful, but definitely *not* top secret. Of the
five chapters that actually deal with encipherment, three deal
strictly with mono-alphabetic substitution. Regardless of how complex
the substitution, a one-to-one correspondence is susceptible to either
character frequency analysis or brute force cracking. The remaining
two chapters deal with poly-alphabetic substitutions that are still,
because of the fact of substitution, subject to brute force attacks.
(The one exception is the generation of a "one time" pad.)
Advanced encryption is currently the province of higher mathematics.
Explanations and sample code for these would require more
sophistication than the current book demands. Still, it would not
have been impossible to include them, and it might have improved the
scope of the book.
Simple, and subject to attack, or not, the techniques in the book can
be used for some measure of privacy and security. As stated in the
preface, even crackable codes may raise the expense of getting at the
data beyond its worth.