Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Simple steps to data encryption : a practical guide to secure computing
Loshin P., Syngress Publishing, Waltham, MA, 2013. 86 pp. Type: Book (978-0-124114-83-8)
Date Reviewed: Jan 23 2014

Protecting information from unwanted disclosure and modification is of utmost importance in contemporary times. This book provides a step-by-step guide to data encryption and digital signatures using Gnu Privacy Guard (GnuPG) encryption software.

The book is written in a storytelling style as a conversation between two people, one a consultant on information security and the other a novice interested in protecting his sensitive information from unwanted disclosure and modification.

The preface provides a brief description of key terms associated with data encryption. It is self-contained and does not require a reference for further understanding of what follows.

The author moves straight into the usage of GnuPG in chapter 1. All of the basic commands required for the encryption and decryption of files are explained at a reasonable depth. Further details on GnuPG commands and examples on usage are given in chapter 2. The author explains user options in detail.

Chapter 3 introduces the concept of public keys. The author introduces basic concepts, including key generation, revocation, and expiration times. A detailed analysis of exact functions for public key-based encryption, decryption, and verification is given in chapter 4, and the concept of digital signatures is addressed.

In chapter 5, the author describes the use of digital signatures in GnuPG, and elaborates on various digital signature types that can be used with the software tool.

In the first six chapters, the author demonstrates the significance of key servers and how public keys can be published (exported) and imported from them. Chapter 7 outlines the steps required for editing and revoking public keys that have already been published and are in use through the key server.

Finally, in chapter 8, the author discusses best practices for verification of software downloads, the correct use of passphrases, and the vulnerabilities inherent in storing passphrases in the random access memory (RAM) cache of a machine. This chapter also explores the pros and cons of the very important aspect of full disk encryption (FDE), and various tools that exist for performing FDE.

The author does justice to his title by providing a really simple step-by-step approach for data encryption. The book is restricted to the use of GnuPG software. Any reader wishing to learn how to use this software tool will find the book extremely useful. However, a background on symmetric and asymmetric encryption, public key servers, keys, hashes, digital signatures, and verification will help the reader better appreciate the inner workings of the data protection and verification techniques described.

More reviews about this item: Amazon, Slashdot

Reviewer:  Zubair Baig Review #: CR141925 (1404-0246)
Bookmark and Share
  Editor Recommended
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy