From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 598aec9b003bcb44e43bd98776c0f14d97ac306c38de0e2768efd500347dc13a
Message ID: <199508151629.MAA16751@pipe1.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-08-15 16:29:24 UTC
Raw Date: Tue, 15 Aug 95 09:29:24 PDT
From: John Young <jya@pipeline.com>
Date: Tue, 15 Aug 95 09:29:24 PDT
To: cypherpunks@toad.com
Subject: PCryptoids
Message-ID: <199508151629.MAA16751@pipe1.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
A couple of cryptoids from PC Mag, 9-12-95:
[Review excerpts] *Network Security, Private Communication
in
a Public World*, review by O. Ryan Tabibian
The book is grouped into three parts: "Cryptography,'
"Authentication," and "Electronic Mail." There is also a
"Leftover" section, which covers security with popular
network operating systems such as Microsoft Windows NT and
NetWare.
Most books fail to cover the difficult subject of
cryptography effectively. *Network Security*, however,
clearly describes the different cryptography methods --
such as secret key, hashing, and public-key cryptography --
as well as a variety of other technologies, including
Diffie-Hellman and RSA.
The second section, "Authentication," deals with how a
system or persons you are communicating with can verify
your identity. Verification schemes range from simple
passwords to complex digital signatures. The authors do a
remarkable job of describing and analyzing the variety of
authentication methods.
Since the majority of your access to the outside world is
through e-mail, your messages are probably most vulnerable.
The book covers some of the popular e-mail security
schemes, such as public key and privacyenhanced mail. A
brief overview of X.400 is also included.
Overall this is perhaps the most comprehensive, yet
easiest-to-understand book covering network security
available.
Network Security, Private Communication in a Public World,
by Charlie Kaufman, Radia Perlman, and Mike Speciner,
$46.00. Prentice Hall PTR, 800-947- 7700; ISBN:
0-13-061466-1.
-----------
[Then, Bill Machrone muses on the utility of an electronic
business cards. Excerpts:]
Some of my correspondents want a magnetic stripe on the
business card, pretty much like the one on your credit
cards. Others want a bar code. Assuming that you don't use
the back of your card for an alternative language, you've
got several square inches back there, plenty of room for
data.
What will we use it for? The database stuff is the easy and
obvious part. Since the computer industry and IS
departments are likely to be the earliest adopters, it
would be a simple matter to standardize on a format that
the reader spits out for easy importation into just about
anything. If the software and I/O devices are cheap enough,
the rest of the world will come along -- and benefit.
Authentication is a potentially huge application. In some
South American countries, fraudulent representation is
common. Crooks collect business cards from legitimate
businesspeople and then misrepresent themselves to
perpetrate a variety of scams. As a result, businesspeople
commonly tear a corner of their card as they hand it to
you. You don't trust a card that wasn't torn in front of
you.
A more elegant solution lies in a new Kodak technology that
can encode your likeness in as little as 500 bytes,
readable by your PDA, notebook, or desktop machines. You
could also include a machine-readable version of your
public encryption key, making it easy for people to send
you secure communications.
----------
Return to August 1995
Return to “John Young <jya@pipeline.com>”
1995-08-15 (Tue, 15 Aug 95 09:29:24 PDT) - PCryptoids - John Young <jya@pipeline.com>