cover

Security Engineering 2 - Errata

Here are the errata for the second edition of my book Security Engineering - A Guide to Building Dependable Distributed Systems. I am grateful to all the readers who've sent them in; they're credited below. Almost all the errors are typos, plus a couple of arithmetic errors:

Page location error replace with
5 line 1 accidentially accidentally
5 para 3 line 8 democractic democratic
5 para 4 line 2 content context
12 para 4 line 12 A principal may considered A principal may be considered
27 para 2 line 6 programmed programmed to
29 para 3 line 9 MacDonald's McDonald's
55 para 3 line 2 ; ,
61 para 2 line 2 no far so far
79 line 1 manoever maneuver
95 para 3 line 10 truns turns
100 para 1 line 5 world, group, and owner owner, group, and world
105 para 4 line 10 woulod would
107 para 2 line 2 will run still run still run
107 para 4 line 3 has meant led to has led to
111 para 6 line 2 host ... on top of a guest guest ... on top of a host
120 para 3 line 6 potentialy potentially
121 para 1 line 15 reovery recovery
131 para 1 line 4 'a, 'a',
131 para 6 line 2 8 corresponds to J 9 corresponds to J
131 para 6 line 3 So in In
150 5.4.1.1 line 7 four-but four-bit
152 para 3 line 1 are a quite a few are quite a few
153 5.4.1.6 line 11 plaintext ciphertext
158 para 3 line 4 PCs computers PCs
159 equation last two commas semi-colons
162 para 2 line 5 addition module 2 addition modulo 2
171 3rd equation Mx1 M.1
174 lines 17–21 KA, KB A and B should be subscripts in key labels
174 para 5 line 6 cancel our cancel out
175 para 5 line 2 interest, As before interest. As before
177 3rd line from bottom bits1 bits
187 para 4 line 7 that biggest cost that the biggest cost
189 para 1 line 2 simple sequential simply sequential
192 sec 6.3 line 2 year years
200 para 2 line 2 For example, A For example, a
202 para 2 line 1 128-bit in 128-bit address in
210 para 1 line 4 tanded to tended to
212 para 3 line 4 one still holds one that still holds
228 para 1 line 2 An Eye An eye
230 para 1 line 5 Handbook) Handbook
233 para 2 line 11 experts like me get invited to experts like me get to
233 para 3 line 4 Paliament Parliament
254 para 1 line 5 which now which has now
258 para 3 line 2 IRM IRM (Information Rights Management) 
259 para 1 line 3 server which provides server provides
260 last line same box. same box.)
263 para 1 line 1 this led to led to this led to
275 quote Mcnealy McNealy
278 para 3 line 9 Aldritch Aldrich
281 para 1 line 2 problem problems
278 para 1 line 10 Aldritch Aldrich
291 para 2 line 14 problems, problems.
292 para 2 line 9 is general terms in general terms
304 para 3 line 10 11/population 11% of the population
306 para 1 line 4 opthalmologists ophthalmologists
307 para 2 line 3 Aldritch Aldrich
309 para 2 line 4 tha that
309 para 2 line 8 ever-large ever-larger
317 para 1 line 3 semaphone semaphore
318 para 2 line 12 they also they are also
318 para 2 line 14 in a more in more
318 para 2 line 4 And even if And if
324 first bullet line 1  clark clerk
327 fifth bullet line 1  will never be will ever be
327 para 4 line 3 check that the check that they
332 para 3 line 7 than that
334 para 2 line 4 the decimalize then decimalize
336 para 3 line 9 kept in kept on
337 para 4 line 5 used it used it to
343 para 2 line 3 security that security than
347 para 1 line 4 Hal Shapiro and Carl Varian Carl Shapiro and Hal Varian
350 para 2 line 4 on your are on your site are
355 para 4 line 4 kinds skimmer kinds of skimmer
356 last line in in the in the
358 para 2 line 7 use interface user interface
359 para 1 line 7 you gas your gas
370 para 1 line 4 Criminologists still arguing Criminologists still argue
370 para 2 line 11 cards car thieves
370 para 3 line 4 have think have to think
370 last para line 1 is figure out is to figure out
382 para 4 line 4 with a more serious with more serious
384 para 2 line 9 insure ensure
388 para 2 line 7 disputed disrupted
390 para 1 line 6 to tachograph the tachograph
396 para 2 line 7 only remembered only remembered only
402 para 3 line 1 amounted accounted
406 para 2 line 7 inspectors inspector
407 para 2 line 3 card door car door
413 para 3 line 7 middle middleware
415 quote cuban Cuban
417 last line the Enola Gay, crashed the Enola Gay crashed
416 footnote last line eniment eminent
418 para 2 line 1 improvization improvisation
421 para 2 line 9 simple simply
440 para 4 line 5 for documents to documents
446 para 4 line 7 it completely destroyed  it is completely destroyed
468 para 3 line 12 Hamburg Hanover
468 para 3 line 15 Latest Latent
489 para 2 line 10 piece equipment piece of equipment
491 bullet 3 line 2 to use destroy to destroy
499 para 3 line 2 one-ship one-chip
514 para 2 line 1 such telephone such as telephone
517 para 3 line 7 where at least the customer where the customer
526 para 4 line 10 recording text recording of text
530 para 3 line 4 in 1914 1914
542 para 3 line 7 state someone state somehow
542 para 4 line 4 thier their
548 para 3 line 9 is now is how
553 para 1 line 6 012345689012345 0123456789012345
553 para 3 line 6 you own bank your own bank
555 line 10 now are they so nor are they so
561 para 4 line 2 a communications links communications links
581 para 3 line 6 radio radios
595 para 1 line 8 electicity electricity
599 para 4 line 3 stores about stories about
601 para 5 line 8 a prudent nations a prudent nation
603 last para line 3 on order to in order to
606 para 1 line 7 machanisms mechanisms
606 para 2 line 4 used ringback used used ringback
610 para 2 line 6 Figure 5.9 Figure 5.10
616 para 2 line 21 where heavily fined were heavily fined
621 para 6 line 3 signint sigint
623 para 3 line 9 are firewalls at firewalls
626 para 2 line 1 victim on victim of
629 para 1 line 14 can how be checked can now be checked
638 para 1 line 3 deperimiterisation deperimeterisation
640 para 2 line 4 October 1999 October 1996
640 para 2 line 6 and, or on and, on
642 para 7 line 1 differs in a various ways differs in various ways
650 line 8 given him gives him
655 para 5 line 1 deperimiterisation deperimeterisation
657 para 4 line 3 enforcement and marketing  enforcement or marketing
661 para 1 line 1 into firewall into a firewall
662 para 2 line 9 Beford's Benford's
662 para 3 line 2 defence to defence is to
665 bullet 1 line are kept of packets of packets
666 line 10 I'm prompter I'm prompted
667 para 3 line 4 exports experts
667 para 4 line 6 than then
671 line 3 K1=h(KCS,NC,NS) K1=h(K0,NC,NS)
674 bullet 1 line 6 identities. identities.’
674 bullet 3 line 3 and their and in their
678 para 3 line 8 LiGong Li Gong
682 para 3 line 3 require need need
685 para 8 line 7 borowed borrowed
686 para 1 line 10 contained a details contained details
686 para 2 line 7 an disputed invoice a disputed invoice
693 para 6 line 7 this key=log attack exist this key-log attack
694 para 2 line 2 61 59
697 para 5 line 4 and many are many
699 para 2 line 5 expert regulations export regulations
700 para 4 line 1 problem with came problem came
706 para 3 line 7 and Apply and Apple
715 para 3 line 4 the caused this caused
716 para 5 line 1 and concentrate and concentrates
718 para 1 line 1 are early 2000s and early 2000s
719 para 3 line 10 started privacy policies stated privacy policies
720 line 2 and and and
720 para 1 line 3 Malcicious Software Malicious Software
720 para 2 line 2 bewteen between
720 para 3 line 12 the a treaty on Trade-Relates a treaty on Trade-Related
721 para 1 line 6 promoters of this challenge promoters of this scheme
722 para 2 line 1 IP movement have have IP movement may have
722 para 2 line 2 Nicholas Sarkozy Nicolas Sarkozy
731 para 1 line 12 mulitplayer multiplayer
733 para 2 line 8 that that than that
735 para 4 line 1 good similar goods similar
742 para 3 line 6 most anything almost anything
743 para 3 line 12 there tales there are tales
743 para 4 line 3 mèlange mélange
744 para 1 line 11 cope' cope
748 para 1 line 14 revealed being revealed
751 para 1 line 7 these is there is
751 para 2 line 4 ranging in site ranging in size
751 para 2 line 7 three layes three layers
751 para 2 lines 10 and 12 Should be Should he
752 line 1 But are But they are
753 para 2 line 1 on the 1990s in the 1990s
754 para 1 line 8 and make and not make
755 para 3 line 7 that than
757 second item line 4  make that scams make scams
760 para 4 line 10 candidate of his choice candidate of her choice
760 para 1 line 5 and wrote wrote
760 para 4 line 5 found and found
761 para 2 line 5 read-team red-team
762 para 3 line 9 tempest Tempest
763 para 2 line 6 he could it could
763 para 2 line 8 somplex complex
763 para 2 line 12  when happens when that happens 
763 para 2 line 16 10% 20%
765 para 3 line 1 is by Greg is Greg
769 third epigram They that can give up Those that would give up
770 para 3 line 11 thr ROC the ROC
770 para 4 line 2 though through
773 para 2 line 6 psychonalysis psychoanalysis
776 para 1 line 18 Democract Democrat
778 para 4 line 11 or example for example
778 para 4 line 14 policymarkers policymakers
782 para 4 line 3 URL is just URL as just
784 para 1 line 5 sensitivity specificity
785 para 2 line 5 time they time
786 para 3 line 7 quite of few quite a few
788 para 1 line 3 perverse incentive perverse incentives
789 para 2 line 2 is a also is also a
792 para 3 line 15 was of the was one of the
793 para 5 line 8 adopt it to adopt it as well
795 para 3 line 11 TSL TLS
797 para 2 line 5 issue, over issue over
801 para 3 line 5 watch TV to watch TV
805 para 2 line 9 of people on people
805 para 4 line 3 dependability Recall dependability. Recall
806 para 2 whole paragraph should be indented
809 para 4 line 2 German state of Hesse German state of Hessen
812 para 1 line 13 offenders of registers registers of offenders
814 para 1 line 2 compilations compilation
814 para 2 line 2 Reports Reporters
814 para 2 line 5 ipen open
816 para 4 line 7 $1.85m, up 85% $1.55m, up 55%
832 para 2 line 2 of something if something
836 para 2 line 1 most anything almost anything
837 para 3 line 2 first Tuesday second Tuesday
847 line 2 of text  pos-Enron post-Enron
847 para 2 line 7 $50,000,000 $5,000,000
850 para 2 line 13 if you’re developing If you’re developing
853 para 3 line 2 any on our field any in our field
855 para 1 line 6 SAFEcode. SAFEcode,
859 para 7 line 2 than pay that pay
871 para 2 line 1 that are done done
872 para 2 line 4 goal of was goal was
877 para 4 line 3 boo boot
877 para 6 line 1 must have involved must have been involved
879 para 4 line 5 bankes' bankers'
883 para 3 line 3 many may
884 para 5 line 3 OpenBSD FreeBSD
885 para 2 line 8 Chapter 22 Chapter 25
889 para 2 line 2 policemen policeman
889 para 4 line 9 techincal technical
897 ref 52 Protocols Security Protocols
906 ref 169 E Biham, A Biryukov E Biham, A Biryukov, A Shamir
911 ref 244 Bundesverfasngsgericht Bundesverfassungsgericht
917 ref 316 Comer Conner
982 ref 1198 virsuses viruses

Further errors have been introduced by the publishers when they translated the book into an ebook. For example, "decimalize" in the fourth line of section 10.4.1 was somehow changed into "decriminalize".

Two errors of fact have been discovered so far. At p 167 I say that the cipher Treyfer has no vulnerabilities that prevent its use in hash functions, not don't affect its use for confidentiality. However, Alex Biryukov and David Wagner published a slide attack at FSE99, reducing the keyspace from 64 bits to about 44 bits. Second, I say on page 837 that Patch Tuesday is the first Tuesday of every month, when in fact it's the second.

Thanks to Adam Atkinson, Antonomasia, Andreas Bender, Alastair Beresford, Maximilian Blochberger, David Boddie, Kristof Boeynaems, Martin Brain, James Davenport, Orr Dinkelman, Dan Eble, Rasit Eskicioglu, Darren Foong, Robert Fenichel, Shailendra Fuloria, Tony Harminc, Dan Hasather, Bill Hey, Neil Jenkins, Nikolaos Karapanos, Ronald De Keulenaer, Hyoung Joong Kim, Patrick Koeberl, Simon Kramer, Jim Lippard, Stephan Neuhaus, Mark Oeltjenbruns, Alexandros Papadopoulos, Chris Pepper, Oscar Pereira, Raphael Phan, Matthew Slyman, Philipp Steinmetz, Nik Sultana, Daniel Thomas, Daniel Wagner-Hall, Randall Walker, and Stuart Wray!

Return to the book's home page.