Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptography in the database : the last line of defense
Kenan K., Addison-Wesley Professional, Boston, MA, 2005. 312 pp. Type: Book (9780321320735)
Date Reviewed: Jun 14 2006

Databases serve as repositories for critical business and personal data. From an attacker’s perspective, attacking a database is much more lucrative than eavesdropping on network links. Privacy, and how companies store and protect sensitive information, is going to be a huge issue in the coming years. Database designers and system administrators have put new security mechanisms in place, but, when those defensive measures crash, the last powerful line of defense remains cryptography. Kenan, a leading cryptography expert at Symantec, demonstrates in this book exactly how to use encryption in enterprise databases and applications.

The first part of the book covers database security, presenting some different types of database-specific attacks, explaining the need to secure data, and discussing how cryptography can address these concerns. The author briefly introduces the main topics of cryptography.

The second part of the book prese!nts the design of a cryptosystem, covering guidelines for cryptographic engines, cryptographic algorithms and keys, key vaults, key managers and manifests, and cryptographic providers and consumers. Many aspects of this part can be applied to any cryptographic project, not just database cryptography. However, we can also find here good advice from the author on how to eliminate weaknesses in the algorithms, and on vulnerabilities that can appear in a database-specific application. Encrypting all data is not a cure-all security solution. Encryption does not address access control issues, and, if everything is encrypted, all data must be decrypted to be read, updated, or deleted. In addition, the encryption process must not interfere with normal access controls, or significantly affect performance. Availability is a key aspect of security, and if, by encrypting data, it becomes unavailable, or the system’s performance is dramatically reduced, a new security problem is cr!eated. Encryption keys must be changed regularly as part of a security policy, which means the database will be inaccessible while data is being decrypted and re-encrypted with a new key or keys. New special difficulties arise in the handling of encrypted data that is indexed.

In the third part of the book, the author covers all of the phases of the life cycle of a cryptographic project. He discusses the requirements, design, development, testing, and deployment phases of a project.

The Java-source example in the last part of the book demonstrates a live implementation of a database cryptosystem, covering the main theoretical aspects discussed in the earlier parts of the book. The 3,000 lines of downloadable code examples let you explore every component of a live database cryptosystem, including key vaults and managers, manifests, engines, and providers.

The author proposes a solution to protect information from the threats that arise from users with unlimi!ted or power rights to databases. He covers confidentiality from the perspective of information assurance, and focuses on protection through encryption. The book presents good case studies about database-applied cryptography. Many technical aspects of database cryptography are presented, and the information covered by the book is of current interest. The text assumes readers have knowledge about cryptography, though there are some explanations presented in the book.

From the author’s point of view, the main audience for this book is made up of the technical leads responsible for protecting sensitive information in a database. These people might be architects, senior system or security analysts, database administrators, or technical project managers. To be successful, the cryptographic architecture must be implemented correctly and securely. The lead must provide guidance throughout the project on secure development practices, as well as technology. I think anyone! who wants to build a system to protect sensitive data could find useful information in this book.

After reading the book, readers will be able to understand why database cryptography must be implemented in a professional manner, since an incorrect or amateur implementation of cryptography can often be worse than no cryptography at all. Architects and administrators who are involved in the design of database security are strongly advised to read this book. Books like this are vital to ensuring that the last line of defense is not easily breached. This book provides a general review of cryptographic concepts, with some attention paid to examples that address certain database issues. Those who maintain large databases who wish to see practical solutions for the problems they face may be slightly disappointed.

Reviewer:  Patriciu Victor-Valeriu Review #: CR132920 (0705-0436)
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Security and Protection (D.4.6 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy