Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Encrypted email : the history and technology of message privacy
Orman H., Springer Publishing Company, Incorporated, New York, NY, 2015. 100 pp. Type: Book (978-3-319213-43-9)
Date Reviewed: Nov 6 2015

This interesting book covers the history and basics of email encryption. It includes three appendices and a two-page list of references. I found it to be well designed and interesting to read (if a little dry), covering a lot of material on encryption.

It starts with an introduction that explains what secure email is. The short chapters that follow cover a brief history of secure email, how secure email works, using secure email, living with secure email, and a conclusion. It provides a description of public- and private-key encryption, key generation, and a brief discussion of various historical systems of securing messages, including privacy enhanced mail, pretty good privacy, multipurpose Internet mail extensions (MIME), public-key infrastructure (PKI), public-key cryptographic standards (PKCS), cryptographic message syntax (CMS), and secure MIME (S/MIME). The book also covers authentication and certificates, with examples of how these work. It gives directions on how to start the process of encrypting personal email using various email clients including Outlook, Thunderbird, Evolution, Apple Mobile Devices, and Android. The author gives specific instructions on how to create a key and certificate through a certificate authority or how to do it yourself by using OpenSSL to create your own certificate authority and keys. The last chapter before the conclusion covers the problem of managing keys and certificates.

As stated earlier, the book is interesting but a little dry. There are a number of grammatical errors throughout the text, but these do not detract from the material. It is not a textbook, but would be a good primer for someone who wants to start using encrypted email. It does require some knowledge of computer operations and math in order to grasp the encryption and data transmission methodology.

Reviewer:  Michael Moorman Review #: CR143913 (1601-0027)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Electronic Mail (H.4.3 ... )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Electronic Mail": Date
Multimedia electronic mail
Borenstein N. Communications of the ACM 34(4): 117-119, 1991. Type: Article
Aug 1 1991
The Z-Mail handbook
Nelson H., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175767)
Oct 1 1992
Electronic mail
Panko R., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy