As the author states, this book is a study of how to apply cryptography to secure telecommunications. It is aimed primarily at readers with some cryptographic and electronics knowledge, and provides a variety of measures and techniques for applying various cryptographic security measures to telecommunications technologies.
The book is divided into two sections. Chapters 1, 2, and 14 are introductory and look at various technical, operational, and managerial aspects of security. The remaining chapters are application-specific, and discuss various technologies and the application of cryptology towards them. These chapters provide unique methods for applying cryptographic techniques, many of which could be applied to alternate chapters. Each chapter is broken into various sections, along with supporting diagrams and tables. The style of writing is straightforward and although technical in nature, readily understandable even by the novice. The only area in which it is lacking is supporting references and a detailed bibliography.
Chapter 1 introduces the reader to cryptology and communications security, including an in-depth section devoted to transient electromagnetic pulse surveillance technology (TEMPEST) issues. Chapter 2 continues the introduction with a look at analog and digital cipher techniques, followed by a discussion on symmetrical and asymmetrical algorithms, and finishing with a detailed section on cryptographic key management issues. Chapter 14 concludes the introductory material and the book with a look at management, support, and training issues, examining the importance of effective techniques for security implementation.
Chapter 3 is the first of the application chapters. It examines voice security in military applications. Three strategies are considered: naval communications and the use of analog HF radio; land-based military operations using standalone digital cipher units; and the application of high-class cipher modules into existing radio transceivers.
Chapter 4 covers telephone security, looking at the various network technologies involved; hardware components; types of threats; how cryptology can be applied; and relevant key management issues. The remaining application chapters all follow a similar format, and cover the following technologies: GSM systems; private UHF/VHF radio networks; frequency hopping (electronic warfare); bulk/link communications (high data rate transmission) in military and public networks; secure fax; PC security; secure email; secure VPN; and military data communications.
This book is suitable as a reference tool and guidebook for telecommunications security professionals or management involved in securing IT communications resources. It is not an introductory text, and some background or familiarity in cryptology and electronics/communications technologies is recommended. Overall, the book provides an interesting and detailed look at the application and implementation of current cryptographic techniques to secure telecommunications in both the military and pub lic sectors.