Programming Books C Java PHP Python Learn more Browse Programming Books
Qty:1
  • List Price: $25.00
  • Save: $5.00 (20%)
FREE Shipping on orders over $35.
In stock but may require an extra 1-2 days to process.
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Condition: Used: Like New
Comment: Like new copy, no markings, clean pages, cover in great condition. Eligible for *FREE* Super Saver Shipping! Buy with confidence. Serving Our Customers with Good Prices and fast service is our goal. Reliable customer service!! Hassle free return policy, satisfaction guaranteed.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Brute Force: Cracking the Data Encryption Standard Hardcover – February 16, 2005

ISBN-13: 978-0387201092 ISBN-10: 0387201092 Edition: 2005th

Buy New
Price: $20.00
50 New from $6.77 52 Used from $0.02
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$6.98
Hardcover
"Please retry"
$20.00
$6.77 $0.02
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 79%). Print edition purchase must be sold by Amazon. Learn more.

Hero Quick Promo
12 Days of Kindle Book Deals
Load your library with Amazon's editors' picks, $2.99 or less each today only. Learn more

Product Details

  • Hardcover: 292 pages
  • Publisher: Copernicus; 2005 edition (February 16, 2005)
  • Language: English
  • ISBN-10: 0387201092
  • ISBN-13: 978-0387201092
  • Product Dimensions: 6.1 x 0.7 x 9.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #829,178 in Books (See Top 100 in Books)

Editorial Reviews

Review

From the reviews:

An excellent story about the thousands of volunteers who battled to prove that the aging standard for date encryption was too weak and to wrestle strong cryptography from the control of the U.S. government...It is a worthy book for almost anyone who has a computer.

-Louis Kruh, Cryptologia, Volume 30, 2006

Brute Force is about as entertaining a read as you will get on cryptography. It provides a detailed account of how DES was taken down and is an interesting read for any student of cryptography and the crypto wars of the 1990s.

-Ben Rothke, UnixReview.com, September 2005

Matt Curtin was right at the heart of the Deschall cracking effort, and his book is excellent in describing the day-to-day progress towards the goal...

-Richard Clayton, Times Higher Education Supplement (U.K.), October 2005

"This book is an exciting popular account of an important event nearly ten years ago in the social history of cryptography. … The book is written to tell the story of how the DESCHALL (Des challenge) project came together, to encourage interest in cryptography amongst the young and to make the subject more accessible to people. It would seem to be successful on all counts." (P. D. F. Ion, Mathematical Reviews, Issue 2006 j)

"DESCHALL’s goal was to search through 72 quadrillion keys to demonstrate the feasibility of a brute force attack on DES … . Curtin starts with the genesis of DES … . he manages to keep interest alive with a taut but lively prose, a focus on the human element of the story … . the non-technical reader will appreciate the evocative similes … . Perhaps most intriguing in Curtin’s narrative are … the human and social aspect of divvying up the workload … ." (Daniel Bilar, MathDL, November, 2005)


More About the Author

Matt Curtin is the founder of Interhack Corporation, a forensic computing and information assurance professional services firm based in Columbus, Ohio, as well as a Lecturer in the Department of Computer Science and Engineering at The Ohio State University. He is a frequent lecturer on computing and security as well as the author of 'Brute Force: Cracking the Data Encryption Standard' (Copernicus Books, 2005) and 'Developing Trust: Online Privacy and Security' (Apress, 2001).

Customer Reviews

4.5 out of 5 stars
5 star
7
4 star
3
3 star
1
2 star
0
1 star
0
See all 11 customer reviews
I fault Curtin for only one tiny fact in the politics of this story.
wiredweird
When approached by the author as to whether I was interested in reading Brute Force, I was-- with some reservations.
frumiousb
DES is the most widely used method of symmetric data encryption ever created.
Ben Rothke

Most Helpful Customer Reviews

10 of 10 people found the following review helpful By Ben Rothke on October 2, 2005
Format: Hardcover
Brute Force: Cracking the Data Encryption Standard is the story of the life and death of DES (data encryption standard). In the early 1970s, the U.S. government put out an open call for a new, stronger encryption algorithm that would be made into a federal standard, known as FIPS (Federal Information Processing Standard.). Numerous solutions were submitted as the DES candidate, including one from IBM. The IBM solution, originally called Lucifer, was chosen to be used as the encryption algorithm. After that, it became known as DES.

DES is the most widely used method of symmetric data encryption ever created. Its 56-bit key size means that there are roughly 72,000,000,000,000,000 (72 quadrillion) possible encryption keys for any given message. DES was always considered a strong encryption method, but strength is relative.

The strength of an encryption system is measured by how resilient it is against attack. From the outset, it was known that DES was susceptible to brute force attacks. A brute force attack, also known as an exhaustive search is an attack against a cryptosystem in which all possible values for the key are attempted - the bigger the key, the more difficult the attack.

It must be remembered that DES was developed long before desktop computers, so the feasibility of a computer that could perform a brute force attack against DES was rendered so expensive and infeasible that the 56-bit key space (in a 64-bit block) of DES was considered strong enough. In reality, Lucifer actually had an original design of a 128-bit block size and 112-bit key size, but politics got in the way, and DES was created in a crippled state from the onset.

By 1997, DES was cracked, and the start of its downfall had commenced.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By frumiousb VINE VOICE on June 4, 2006
Format: Hardcover
When approached by the author as to whether I was interested in reading Brute Force, I was-- with some reservations. It has been a while since I hung up my tech strategy hat to go work in the non-IT world. Also, even though I'm reasonably technical, I'm a long way from a Cypherpunk. I was a little concern that it would get too technical for me to really appreciate.

To be honest, I was also curious whether there was enough material about DESCHALL to really warrant a full book. I had been aware of the crack when it happened, and had honestly not looked much further than the "brute force. took several months. ho hum." attitude that the press seemed to be applying to the story.

I am pleased to say that I was wrong to be worried on both counts.

First of all, Curtin is a blessedly clear writer. As he covers topics which are cryptography specific, he explains them. Furthermore, he explains them using simple language so that I had no problem understanding. You do not need to be a cryptographer to read this book.

Second, there apparently is enough material for a full book. Curtin manages to set up a really interesting story that is fully placed in a political and social context. Bonus because he does that without rehashing ground that has been covered about PGP and Zimmerman in other books. I found myself really interested in the DESCHALL efforts. It was particularly interesting to start drawing the analogy with later distributed computing efforts that were essentially tested with this effort.

The foreward by Gilmore was fun enough-- but then, I like his writing and I really like the EFF.

I would recommend this book for someone interested in the history of computing, or for someone with a special interest in security issues.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover
Matt Curtin has written a fascinating book that courses through the history of cryptography, the power of social networks and the Internet to bring them into being, conquering a technological challenge through altruistic cooperation, the competitive spirit, the government's desire to intrude on its citizen's privacy and battle against government in behalf of individual freedom. It sounds like a lot and it is --- but Curtin is blessed with the ability to write in plain English, thus rendering even the most esoteric technology understandable.

The central story revolves around DES, a 56-bit Data Encryption Standard, adopted by the U.S. government in the early 1980s. Proponents argued that DES was unbreakable because there were 76 quadrillion possible keys. Curtin does a masterful job of providing a brief, but thorough history of cryptography through the ages. He deserves an accolade for this. Cryptography is not simple subject and many writers on the subject presume the reader already knows cryptography. Curtin doesn't make this mistake.

Throughout the 1980s and 1990s, technologists and civil libertarians became increasingly concerned that 56-bit DES wasn't secure enough; that it could be defeated and supposedly confidential data compromised. At the same time, the Clinton administration had banned the export of powerful encryption technology hurting businesses and was demanding that all producers of cryptographic systems provide the government with a key, literally a backdoor, so the government at its whim could access encrypted data. The Clinton White House, of course, claimed that law enforcement needed these powers to protect children from pornography, fight terrorism and the war on drugs.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews