Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Encryption for digital content
Kiayias A., Pehlivanoglu S., Springer-Verlag New York, Inc., New York, NY, 2010. 209 pp. Type: Book (978-1-441900-43-2)
Date Reviewed: May 25 2011

The protection of digital content from misappropriation and unauthorized propagation and modification is a desired requirement for digital products. This book provides several cryptographic mechanisms for protecting digital content.

The first three chapters introduce three basic cryptographic mechanisms for different digital content distribution security issues: “Fingerprinting Codes” addresses the source identification issue in digital content distribution; “Broadcast Encryption” addresses the distribution control issue in digital content distribution; and “Traitor Tracing” addresses the source identification issue in the context of decryption algorithms. The next two chapters focus on two advanced topics: the combination of tracing and revocation in various content distribution settings, and pirate evolution--a practical attack against trace and revoke schemes.

With the necessary prerequisites, even readers with no prior knowledge of cryptography can gain a basic understanding of this field. Each chapter defines the security requirement, introduces some concrete implementation examples, and proves the security of these schemes. Also, each chapter ends with a detailed bibliographic note, which is useful for further study.

The book is based in part on Pehlivanoglu’s doctoral thesis, which implies that it will provide a state-of-the-art overview of encryption for digital content. If I could change one thing, I would have added a conclusion before the references.

Overall, I recommend this survey of digital content encryption for cryptographers and professional engineers.

Reviewer:  Zheng Gong Review #: CR139087 (1109-0897)
Bookmark and Share
 
Data Encryption (E.3 )
 
 
Intellectual Property Rights (K.4.1 ... )
 
 
Hardware/ Software Protection (K.5.1 )
 
 
Public Policy Issues (K.4.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy