100% found this document useful (5 votes)
106 views77 pages

Cryptography and Network Security 4th Edition Tom ST Denis Ebook All Chapters PDF

The document provides information on various ebooks related to cryptography and network security, including titles such as 'Cryptography and Network Security 4th Edition' by Tom St Denis and 'Cryptography and Network Security Principles and Practices, Fourth Edition' by William Stallings. It includes download links for these books and additional resources for exploring more ebooks. The document emphasizes the importance of security in the context of modern technology and offers a comprehensive overview of cryptographic principles and applications.

Uploaded by

nkunutooke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
106 views77 pages

Cryptography and Network Security 4th Edition Tom ST Denis Ebook All Chapters PDF

The document provides information on various ebooks related to cryptography and network security, including titles such as 'Cryptography and Network Security 4th Edition' by Tom St Denis and 'Cryptography and Network Security Principles and Practices, Fourth Edition' by William Stallings. It includes download links for these books and additional resources for exploring more ebooks. The document emphasizes the importance of security in the context of modern technology and offers a comprehensive overview of cryptographic principles and applications.

Uploaded by

nkunutooke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

Visit https://ebookfinal.

com to download the full version and


explore more ebooks

Cryptography and Network Security 4th Edition


Tom St Denis

_____ Click the link below to download _____


https://ebookfinal.com/download/cryptography-and-
network-security-4th-edition-tom-st-denis/

Explore and download more ebooks at ebookfinal.com


Here are some suggested products you might be interested in.
Click the link to download

Network Security Essentials Applications and Standards 4th


Edition F3Thinker !

https://ebookfinal.com/download/network-security-essentials-
applications-and-standards-4th-edition-f3thinker/

Computer Security and Cryptography 1st edition Edition


Alan G. Konheim

https://ebookfinal.com/download/computer-security-and-
cryptography-1st-edition-edition-alan-g-konheim/

Handbook of financial cryptography and security 1st


Edition Burton Rosenberg

https://ebookfinal.com/download/handbook-of-financial-cryptography-
and-security-1st-edition-burton-rosenberg/

Security Sage s Guide to Hardening the Network


Infrastructure 4th Edition Stuart Mcclure

https://ebookfinal.com/download/security-sage-s-guide-to-hardening-
the-network-infrastructure-4th-edition-stuart-mcclure/
Estate Planning Basics 4th edition Denis Clifford

https://ebookfinal.com/download/estate-planning-basics-4th-edition-
denis-clifford/

Cryptography for Security and Privacy in Cloud Computing


1st Edition Stefan Rass

https://ebookfinal.com/download/cryptography-for-security-and-privacy-
in-cloud-computing-1st-edition-stefan-rass/

Industrial Network Security 2nd Edition Teumim

https://ebookfinal.com/download/industrial-network-security-2nd-
edition-teumim/

Network Security Auditing 1st Edition Chris Jackson

https://ebookfinal.com/download/network-security-auditing-1st-edition-
chris-jackson/

Hacking exposed network security secrets and solutions


Joel Scambray

https://ebookfinal.com/download/hacking-exposed-network-security-
secrets-and-solutions-joel-scambray/
Cryptography and Network Security 4th Edition Tom St
Denis Digital Instant Download
Author(s): Tom St Denis
ISBN(s): 9781597491044, 1597491047
Edition: 4
File Details: PDF, 52.98 MB
Year: 2005
Language: english
本资源来自数缘社区
http://maths.utime.cn:81

欢迎来到数缘社区。本社区是一个高等数学及密码学的技术性论坛,由山东大学数学院研究
生创办。在这里您可以尽情的遨游数学的海洋。作为站长,我诚挚的邀请您加入,希望大家能一
起支持发展我们的论坛,充实每个版块。把您宝贵的资料与大家一起分享!

数学电子书库
每天都有来源于各类网站的与数学相关的新内容供大家浏览和下载,您既可以点击左键弹出
网页在线阅读,又可以点右键选择下载。现在书库中藏书 1000 余本。如果本站没有您急需的电
子书,可以发帖说明,我们有专人负责为您寻找您需要的电子书。

密码学论文库
国内首创信息安全专业的密码学论文库,主要收集欧密会(Eurocrypt)、美密会(Crypto) 、
亚密会(Asiacrypt)等国内外知名论文。现在论文库中收藏论文 4000 余篇(包括论文库版块 700
余篇、论坛顶部菜单“密码学会议论文集”3000 余篇) 。如果本站没有您急需的密码学论文,可
以发帖说明,我们有专人负责为您寻找您需要的论文。
提示:本站已经收集到 1981-2003 年欧密会、美密会全部论文以及 1997 年-2003 年五大
会议全部论文(欧密会、美密会、亚密会、PKC、FSE)。

数学综合讨论区
论坛管理团队及部分会员来源于山东大学数学院七大专业(基础数学、应用数学、运筹学、
控制论、计算数学、统计学、信息安全)
,在数学方面均为思维活跃、成绩优秀的研究生,相信
会给您的数学学习带来很大的帮助。

密码学与网络安全
山东大学数学院的信息安全专业师资雄厚,前景广阔,具有密码理论、密码技术与网络安全
技术三个研究方向。有一大批博士、硕士及本科生活跃于本论坛。本版块适合从事密码学或网络
安全方面学习研究的朋友访问。

网络公式编辑器
数缘社区公式编辑器采用 Latex 语言,适用于任何支持图片格式的论坛或网页。在本论坛编
辑好公式后,您可以将自动生成的公式图片的链接直接复制到你要发的帖子里以图片的形式发
表。

如果您觉得本站对您的学习和成长有所帮助,请把它添加到您的收藏夹。如果您对本论坛有
任何的意见或者建议,请来论坛留下您宝贵的意见。

附录 A:本站电子书库藏书目录
http://maths.utime.cn:81/bbs/dispbbs.asp?boardID=18&ID=2285

附录 B:版权问题
数缘社区所有电子资源均来自网络,版权归原作者所有,本站不承担任何版权责任。
Cryptography and Network Security Principles and Practices, Fourth Edition

By William Stallings
Publisher: Prentice Hall

Pub Date: November 16, 2005


Print ISBN-10: 0-13-187316-4

Print ISBN-13: 978-0-13-187316-2

eText ISBN-10: 0-13-187319-9


• Table of Contents
eText ISBN-13: 978-0-13-187319-3
• Index
Pages : 592

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of cryptography and network security have matured, more practical, readily available
applications to enforce network security have developed. This text provides a practical survey of both the
principles and practice of cryptography and network security. First, the basic issues to be addressed by a
network security capability are explored through a tutorial and survey of cryptography and network security
technology. Then, the practice of network security is explored via practical applications that have been
implemented and are in use today.
Cryptography and Network Security Principles and Practices, Fourth Edition

By William Stallings
Publisher: Prentice Hall

Pub Date: November 16, 2005


Print ISBN-10: 0-13-187316-4

Print ISBN-13: 978-0-13-187316-2

eText ISBN-10: 0-13-187319-9


• Table of Contents
eText ISBN-13: 978-0-13-187319-3
• Index
Pages : 592

Copyright
Notation xi
Preface xiii
Objectives xiii
Intended Audience xiii
Plan of the Book xiv
Internet Services for Instructors and Students xiv
Projects for Teaching Cryptography and Network Security xiv
What's New in the Fourth Edition xv
Acknowledgments xvi
Chapter 0. Reader's Guide 1
Section 0.1. Outline of this Book 2
Section 0.2. Roadmap 2
Section 0.3. Internet and Web Resources 4
Chapter 1. Introduction 6
Section 1.1. Security Trends 9
Section 1.2. The OSI Security Architecture 12
Section 1.3. Security Attacks 13
Section 1.4. Security Services 16
Section 1.5. Security Mechanisms 19
Section 1.6. A Model for Network Security 22
Section 1.7. Recommended Reading and Web Sites 24
Section 1.8. Key Terms, Review Questions, and Problems 25
Part One: Symmetric Ciphers 26
Chapter 2. Classical Encryption Techniques 28
Section 2.1. Symmetric Cipher Model 30
Section 2.2. Substitution Techniques 35
Section 2.3. Transposition Techniques 49
Section 2.4. Rotor Machines 51
Section 2.5. Steganography 53
Section 2.6. Recommended Reading and Web Sites 55
Section 2.7. Key Terms, Review Questions, and Problems 56
Chapter 3. Block Ciphers and the Data Encryption Standard 62
Section 3.1. Block Cipher Principles 64
Section 3.2. The Data Encryption Standard 72
Section 3.3. The Strength of Des 82
Section 3.4. Differential and Linear Cryptanalysis 83
Section 3.5. Block Cipher Design Principles 86
Section 3.6. Recommended Reading 90
Section 3.7. Key Terms, Review Questions, and Problems 90
Chapter 4. Finite Fields 95
Section 4.1. Groups, Rings, and Fields 97
Section 4.2. Modular Arithmetic 101
Section 4.3. The Euclidean Algorithm 107
Section 4.4. Finite Fields of The Form GF(p) 109
Section 4.5. Polynomial Arithmetic 113
Section 4.6. Finite Fields Of the Form GF(2n) 119
Section 4.7. Recommended Reading and Web Sites 129
Section 4.8. Key Terms, Review Questions, and Problems 130
Chapter 5. Advanced Encryption Standard 134
Section 5.1. Evaluation Criteria For AES 135
Section 5.2. The AES Cipher 140
Section 5.3. Recommended Reading and Web Sites 160
Section 5.4. Key Terms, Review Questions, and Problems 161
Appendix 5A Polynomials with Coefficients in GF(28) 163
Appendix 5B Simplified AES 165
Chapter 6. More on Symmetric Ciphers 174
Section 6.1. Multiple Encryption and Triple DES 175
Section 6.2. Block Cipher Modes of Operation 181
Section 6.3. Stream Ciphers and RC4 189
Section 6.4. Recommended Reading and Web Site 194
Section 6.5. Key Terms, Review Questions, and Problems 194
Chapter 7. Confidentiality Using Symmetric Encryption 199
Section 7.1. Placement of Encryption Function 201
Section 7.2. Traffic Confidentiality 209
Section 7.3. Key Distribution 210
Section 7.4. Random Number Generation 218
Section 7.5. Recommended Reading and Web Sites 227
Section 7.6. Key Terms, Review Questions, and Problems 228
Part Two: Public-Key Encryption and Hash Functions 232
Chapter 8. Introduction to Number Theory 234
Section 8.1. Prime Numbers 236
Section 8.2. Fermat's and Euler's Theorems 238
Section 8.3. Testing for Primality 242
Section 8.4. The Chinese Remainder Theorem 245
Section 8.5. Discrete Logarithms 247
Section 8.6. Recommended Reading and Web Sites 253
Section 8.7. Key Terms, Review Questions, and Problems 254
Chapter 9. Public-Key Cryptography and RSA 257
Section 9.1. Principles of Public-Key Cryptosystems 259
Section 9.2. The RSA Algorithm 268
Section 9.3. Recommended Reading and Web Sites 280
Section 9.4. Key Terms, Review Questions, and Problems 281
Appendix 9A Proof of the RSA Algorithm 285
Appendix 9B The Complexity of Algorithms 286
Chapter 10. Key Management; Other Public-Key Cryptosystems 289
Section 10.1. Key Management 290
Section 10.2. Diffie-Hellman Key Exchange 298
Section 10.3. Elliptic Curve Arithmetic 301
Section 10.4. Elliptic Curve Cryptography 310
Section 10.5. Recommended Reading and Web Sites 313
Section 10.6. Key Terms, Review Questions, and Problems 314
Chapter 11. Message Authentication and Hash Functions 317
Section 11.1. Authentication Requirements 319
Section 11.2. Authentication Functions 320
Section 11.3. Message Authentication Codes 331
Section 11.4. Hash Functions 334
Section 11.5. Security of Hash Functions and Macs 340
Section 11.6. Recommended Reading 344
Section 11.7. Key Terms, Review Questions, and Problems 344
Appendix 11A Mathematical Basis of the Birthday Attack 346
Chapter 12. Hash and MAC Algorithms 351
Section 12.1. Secure Hash Algorithm 353
Section 12.2. Whirlpool 358
Section 12.3. HMAC 368
Section 12.4. CMAC 372
Section 12.5. Recommended Reading and Web Sites 374
Section 12.6. Key Terms, Review Questions, and Problems 374
Chapter 13. Digital Signatures and Authentication Protocols 377
Section 13.1. Digital Signatures 378
Section 13.2. Authentication Protocols 382
Section 13.3. Digital Signature Standard 390
Section 13.4. Recommended Reading and Web Sites 393
Section 13.5. Key Terms, Review Questions, and Problems 393
Part Three: Network Security Applications 398
Chapter 14. Authentication Applications 400
Section 14.1. Kerberos 401
Section 14.2. X.509 Authentication Service 419
Section 14.3. Public-Key Infrastructure 428
Section 14.4. Recommended Reading and Web Sites 430
Section 14.5. Key Terms, Review Questions, and Problems 431
Appendix 14A Kerberos Encryption Techniques 433
Chapter 15. Electronic Mail Security 436
Section 15.1. Pretty Good Privacy 438
Section 15.2. S/MIME 457
Section 15.3. Key Terms, Review Questions, and Problems 474
Appendix 15A Data Compression Using Zip 475
Appendix 15B Radix-64 Conversion 478
Appendix 15C PGP Random Number Generation 479
Chapter 16. IP Security 483
Section 16.1. IP Security Overview 485
Section 16.2. IP Security Architecture 487
Section 16.3. Authentication Header 493
Section 16.4. Encapsulating Security Payload 498
Section 16.5. Combining Security Associations 503
Section 16.6. Key Management 506
Section 16.7. Recommended Reading and Web Site 516
Section 16.8. Key Terms, Review Questions, and Problems 517
Appendix 16A Internetworking and Internet Protocols 518
Chapter 17. Web Security 527
Section 17.1. Web Security Considerations 528
Section 17.2. Secure Socket Layer and Transport Layer Security 531
Section 17.3. Secure Electronic Transaction 549
Section 17.4. Recommended Reading and Web Sites 560
Section 17.5. Key Terms, Review Questions, and Problems 561
Part Four: System Security 563
Chapter 18. Intruders 565
Section 18.1. Intruders 567
Section 18.2. Intrusion Detection 570
Section 18.3. Password Management 582
Section 18.4. Recommended Reading and Web Sites 591
Section 18.5. Key Terms, Review Questions, and Problems 592
Appendix 18A The Base-Rate Fallacy 594
Chapter 19. Malicious Software 598
Section 19.1. Viruses and Related Threats 599
Section 19.2. Virus Countermeasures 610
Section 19.3. Distributed Denial of Service Attacks 614
Section 19.4. Recommended Reading and Web Sites 619
Section 19.5. Key Terms, Review Questions, and Problems 620
Chapter 20. Firewalls 621
Section 20.1. Firewall Design Principles 622
Section 20.2. Trusted Systems 634
Section 20.3. Common Criteria for Information Technology Security Evaluation 640
Section 20.4. Recommended Reading and Web Sites 644
Section 20.5. Key Terms, Review Questions, and Problems 645
Appendix A. Standards and Standards-Setting Organizations 647
Section A.1. The Importance of Standards 648
Section A.2. Internet Standards and the Internet Society 649
Section A.3. National Institute of Standards and Technology 652
Appendix B. Projects for Teaching Cryptography and Network Security 653
Section B.1. Research Projects 654
Section B.2. Programming Projects 655
Section B.3. Laboratory Exercises 655
Section B.4. Writing Assignments 655
Section B.5. Reading/Report Assignments 656
Glossary 657
References 663
Abbreviations 663
Inside Front Cover InsideFrontCover
Inside Back Cover InsideBackCover
Index
Copyright

[Page ii]

Library of Congress Cataloging-in-Publication Data on File

Vice President and Editorial Director, ECS: Marcia J. Horton

Executive Editor: Tracy Dunkelberger

Editorial Assistant: Christianna Lee

Executive Managing Editor: Vince O'Brien

Managing Editor: Camille Trentacoste

Production Editor: Rose Kernan

Director of Creative Services: Paul Belfanti

Cover Designer: Bruce Kenselaar

Managing Editor, AV Management and Production: Patricia Burns

Art Editor: Gregory Dulles

Manufacturing Manager: Alexis Heydt-Long

Manufacturing Buyer: Lisa McDowell

Marketing Manager: Robin O'Brien

Marketing Assistant: Barrie Reinhold

© 2006 Pearson Education, Inc.

Pearson Prentice Hall

Pearson Education, Inc.

Upper Saddle River, NJ 07458

All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the
publisher.

Pearson Prentice Hall™ is a trademark of Pearson Education, Inc.


The author and publisher of this book have used their best efforts in preparing this book. These efforts include the development,
research, and testing of the theories and programs to determine their effectiveness. The author and publisher make no warranty of any
kind, expressed or implied, with regard to these programs or the documentation contained in this book. The author and publisher shall
not be liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or
use of these programs.

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

Pearson Education Ltd., London


Pearson Education Australia Pty. Ltd., Sydney
Pearson Education Singapore, Pte. Ltd.
Pearson Education North Asia Ltd., Hong Kong
Pearson Education Canada, Inc., Toronto
Pearson Educacíon de Mexico, S.A. de C.V.
Pearson EducationJapan, Tokyo
Pearson Education Malaysia, Pte. Ltd.
Pearson Education Inc., Upper Saddle River, New Jersey

[Page iii]

Dedication

To Antigone never dull never boring always a Sage


[Page xi]

Notation
Even the natives have difficulty mastering this peculiar vocabulary.

The Golden Bough, Sir James George Frazer

Symbol Expression Meaning

D, K D(K, Y) Symmetric decryption of ciphertext Y using secret key K.

D, PRa D(PRa, Y) Asymmetric decryption of ciphertext Y using A's private key PRa

D,PUa D(PUa, Y) Asymmetric decryption of ciphertext Y using A's public key PUa

E, K E(K, X) Symmetric encryption of plaintext X using secret key K.

E, PRa E(PRa, X) Asymmetric encryption of plaintext X using A's private key PRa

E, PUa E(PUa, X) Asymmetric encryption of plaintext X using A's public key PUa

K Secret key

PRa Private key of user A

PUa Public key of user A

C, K C(K, X) Message authentication code of message X using secret key K.

GF(p) The finite field of order p, where p is prime. The field is defined as the
set Zp together with the arithmetic operations modulop.

n n
GF(2 ) The finite field of order 2 .

Zn Set of nonnegative integers less thann

gcd gcd(i, j) Greatest common divisor; the largest positive integer that divides bothi
and j with no remainder on division.

mod a mod m Remainder after division of a by m.

mod, a b(mod m) a mod m = b mod m

mod, a b(mod m) a mod m b mod m

dlog dloga,p(b) Discrete logarithm of the number b for the base a (mod p)

f f(n) The number of positive integers less than n and relatively prime to n.
This is Euler's totient function.

S a1 + a2 + ... + an
Symbol Expression Meaning

a1 x a2 x ... x an

| i|j i divides j, which means that there is no remainder whenj is divided by i

|,| |a| Absolute value of a

|| x||y x concatenated with y

x is approximately equal to y
x y

Exclusive-OR of x and y for single-bit variables; Bitwise exclusive-OR


x y
of x and y for multiple-bit variables

The largest integer less than or equal tox


, x

x S The element x is contained in the set S.

A (a1,a2, ...,ak) The integer A corresponds to the sequence of integers (a1,a2, ...,ak)
[Page xiii]

Preface
"The tie, if I might suggest it, sir, a shade more tightly knotted. One aims at the perfect butterfly effect. If you will
permit me"

"What does it matter, Jeeves, at a time like this? Do you realize that Mr. Little's domestic happiness is hanging in
the scale?"

"There is no time, sir, at which ties do not matter."

Very Good, Jeeves! P. G. Wodehouse

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed
no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the
explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and
individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the
need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from
network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of
practical, readily available applications to enforce network security.
[Page xiii (continued)]

Objectives

It is the purpose of this book to provide a practical survey of both the principles and practice of cryptography and network security. In the
first two parts of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and
survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical
applications that have been implemented and are in use to provide network security.

The subject, and therefore this book, draws on a variety of disciplines. In particular, it is impossible to appreciate the significance of
some of the techniques discussed in this book without a basic understanding of number theory and some results from probability theory.
Nevertheless, an attempt has been made to make the book self-contained. The book presents not only the basic mathematical results
that are needed but provides the reader with an intuitive understanding of those results. Such background material is introduced as
needed. This approach helps to motivate the material that is introduced, and the author considers this preferable to simply presenting all
of the mathematical material in a lump at the beginning of the book.
[Page xiii (continued)]

Intended Audience

The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate
course in cryptography and network security for computer science, computer engineering, and electrical engineering majors. It covers the
material in IAS2 Security Mechanisms, a core area in the Information Technology body of knowledge; NET4 Security, another core area
in the Information Technology body of knowledge; and IT311, Cryptography, an advanced course; these subject areas are part of the
Draft ACM/IEEE Computer Society Computing Curricula 2005.

[Page xiv]

The book also serves as a basic reference volume and is suitable for self-study.
[Page xiv (continued)]

Plan of the Book

The book is organized in four parts:

Part One. Conventional Encryption: A detailed examination of conventional encryption algorithms and design
principles, including a discussion of the use of conventional encryption for confidentiality.

Part Two. Public-Key Encryption and Hash Functions:A detailed examination of public-key encryption
algorithms and design principles. This part also examines the use of message authentication codes and hash
functions, as well as digital signatures and public-key certificates.

Part Three. Network Security Practice: Covers important network security tools and applications, including
Kerberos, X.509v3 certificates, PGP, S/MIME, IP Security, SSL/TLS, and SET.

Part Four. System Security: Looks at system-level security issues, including the threat of and countermeasures
for intruders and viruses, and the use of firewalls and trusted systems.

In addition, the book includes an extensive glossary, a list of frequently used acronyms, and a bibliography. Each chapter includes
homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites.

A more detailed, chapter-by-chapter summary of each part appears at the beginning of that part.
[Page xiv (continued)]

Internet Services for Instructors and Students

There is a Web site for this book that provides support for students and instructors. The site includes links to other relevant sites,
transparency masters of figures and tables in the book in PDF (Adobe Acrobat) format, and PowerPoint slides. The Web page is at
WilliamStallings.com/Crypto/Crypto4e.html. As soon as typos or other errors are discovered, an errata list for this book will be available
at WilliamStallings.com. In addition, the Computer Science Student Resource site, at WilliamStallings.com/StudentSupport.html,
provides documents, information, and useful links for computer science students and professionals.
[Page xiv (continued)]

Projects for Teaching Cryptography and Network Security

For many instructors, an important component of a cryptography or security course is a project or set of projects by which the student
gets hands-on experience to reinforce concepts from the text. This book provides an unparalleled degree of support for including a
projects component in the course. The instructor's manual not only includes guidance on how to assign and structure the projects, but
also includes a set of suggested projects that covers a broad range of topics from the text:

[Page xv]

Research projects: A series of research assignments that instruct the student to research a particular topic on the Internet
and write a report

Programming projects: A series of programming projects that cover a broad range of topics and that can be implemented in
any suitable language on any platform

Lab exercises: A series of projects that involve programming and experimenting with concepts from the book

Writing assignments: A set of suggested writing assignments, by chapter

Reading/report assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to
read and then write a short report

See Appendix B for details.


[Page xv (continued)]

What's New in the Fourth Edition

In the three years since the third edition of this book was published, the field has seen continued innovations and improvements. In this
new edition, I try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin this
process of revision, the third edition was extensively reviewed by a number of professors who teach the subject. In addition, a number of
professionals working in the field reviewed individual chapters. The result is that, in many places, the narrative has been clarified and
tightened, and illustrations have been improved. Also, a large number of new "field-tested" problems have been added.

Beyond these refinements to improve pedagogy and user friendliness, there have been major substantive changes throughout the book.
Highlights include the following:

Simplified AES: This is an educational, simplified version of AES (Advanced Encryption Standard), which enables students
to grasp the essentials of AES more easily.

Whirlpool: This is an important new secure hash algorithm based on the use of a symmetric block cipher.

CMAC: This is a new block cipher mode of operation. CMAC (cipher-based message authentication code) provides message
authentication based on the use of a symmetric block cipher.

Public-key infrastructure (PKI): This important topic is treated in this new edition.

Distributed denial of service (DDoS) attacks:DDoS attacks have assumed increasing significance in recent years.

Common Criteria for Information Technology Security Evaluation: The Common Criteria have become the international
framework for expressing security requirements and evaluating products and implementations.

Online appendices: Six appendices available at this book's Web site supplement the material in the text.

In addition, much of the other material in the book has been updated and revised.
[Page xvi]

Acknowledgments

This new edition has benefited from review by a number of people, who gave generously of their time and expertise. The following
people reviewed all or a large part of the manuscript: Danny Krizanc (Wesleyan University), Breno de Medeiros (Florida State
University), Roger H. Brown (Rensselaer at Hartford), Cristina Nita-Rotarul (Purdue University), and Jimmy McGibney (Waterford
Institute of Technology).

Thanks also to the many people who provided detailed technical reviews of a single chapter: Richard Outerbridge, Jorge Nakahara,
Jeroen van de Graaf, Philip Moseley, Andre Correa, Brian Bowling, James Muir, Andrew Holt, Décio Luiz Gazzoni Filho, Lucas Ferreira,
Dr. Kemal Bicakci, Routo Terada, Anton Stiglic, Valery Pryamikov, and Yongge Wang.

Joan Daemen kindly reviewed the chapter on AES. Vincent Rijmen reviewed the material on Whirlpool. And Edward F. Schaefer
reviewed the material on simplified AES.

The following people contributed homework problems for the new edition: Joshua Brandon Holden (Rose-Hulman Institute if
Technology), Kris Gaj (George Mason University), and James Muir (University of Waterloo).

Sanjay Rao and Ruben Torres of Purdue developed the laboratory exercises that appear in the instructor's supplement. The following
people contributed project assignments that appear in the instructor's supplement: Henning Schulzrinne (Columbia University); Cetin
Kaya Koc (Oregon State University); and David Balenson (Trusted Information Systems and George Washington University).

Finally, I would like to thank the many people responsible for the publication of the book, all of whom did their usual excellent job. This
includes the staff at Prentice Hall, particularly production manager Rose Kernan; my supplements manager Sarah Parker; and my new
editor Tracy Dunkelberger. Also, Patricia M. Daly did the copy editing.

With all this assistance, little remains for which I can take full credit. However, I am proud to say that, with no help whatsoever, I selected
all of the quotations.
[Page 1]

Chapter 0. Reader's Guide

0.1 Outline of this Book

0.2 Roadmap

Subject Matter

Topic Ordering

0.3 Internet and Web Resources

Web Sites for This Book

Other Web Sites

USENET Newsgroups

[Page 2]

The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to
receive him; not on the chance of his not attacking, but rather on the fact that we have made our position
unassailable.

The Art of War, Sun Tzu

This book, with its accompanying Web site, covers a lot of material. Here we give the reader an overview.
[Page 2 (continued)]

0.1. Outline of this Book

Following an introductory chapter, Chapter 1, the book is organized into four parts:

Part One: Symmetric Ciphers: Provides a survey of symmetric encryption, including classical and modern
algorithms. The emphasis is on the two most important algorithms, the Data Encryption Standard (DES) and the
Advanced Encryption Standard (AES). This part also addresses message authentication and key management.

Part Two: Public-Key Encryption and Hash Functions: Provides a survey of public-key algorithms, including
RSA (Rivest-Shamir-Adelman) and elliptic curve. It also covers public-key applications, including digital signatures
and key exchange.

Part Three: Network Security Practice: Examines the use of cryptographic algorithms and security protocols to
provide security over networks and the Internet. Topics covered include user authentication, e-mail, IP security,
and Web security.

Part Four: System Security: Deals with security facilities designed to protect a computer system from security
threats, including intruders, viruses, and worms. This part also looks at firewall technology.

Many of the cryptographic algorithms and network security protocols and applications described in this book have been specified as
standards. The most important of these are Internet Standards, defined in Internet RFCs (Request for Comments), and Federal
Information Processing Standards (FIPS), issued by the National Institute of Standards and Technology (NIST). Appendix A discusses
the standards-making process and lists the standards cited in this book.
[Page 2 (continued)]

0.2. Roadmap

Subject Matter

The material in this book is organized into three broad categories:

Cryptology: This is the study of techniques for ensuring the secrecy and/or authenticity of information. The two
main branches of cryptology are cryptography, which is the study of the design of such techniques; and
cryptanalysis, which deals with the defeating such techniques, to recover information, or forging information that
will be accepted as authentic.

[Page 3]

Network security: This area covers the use of cryptographic algorithms in network protocols and network
applications.

Computer security: In this book, we use this term to refer to the security of computers against intruders (e.g.,
hackers) and malicious software (e.g., viruses). Typically, the computer to be secured is attached to a network and
the bulk of the threats arise from the network.

The first two parts of the book deal with two distinct cryptographic approaches: symmetric cryptographic algorithms and public-key, or
asymmetric, cryptographic algorithms. Symmetric algorithms make use of a single shared key shared by two parties. Public-key
algorithms make use of two keys: a private key known only to one party, and a public key, available to other parties.

Topic Ordering

This book covers a lot of material. For the instructor or reader who wishes a shorter treatment, there are a number of opportunities.

To thoroughly cover the material in the first two parts, the chapters should be read in sequence. With the exception of the Advanced
Encryption Standard (AES), none of the material in Part One requires any special mathematical background. To understand AES, it is
necessary to have some understanding of finite fields. In turn, an understanding of finite fields requires a basic background in prime
numbers and modular arithmetic. Accordingly, Chapter 4 covers all of these mathematical preliminaries just prior to their use inChapter 5
on AES. Thus, if Chapter 5 is skipped, it is safe to skip Chapter 4 as well.

Chapter 2 introduces some concepts that are useful in later chapters ofPart One. However, for the reader whose sole interest is
contemporary cryptography, this chapter can be quickly skimmed. The two most important symmetric cryptographic algorithms are DES
and AES, which are covered in Chapters 3 and 5, respectively. Chapter 6 covers two other interesting algorithms, both of which enjoy
commercial use. This chapter can be safely skipped if these algorithms are not of interest.

For Part Two, the only additional mathematical background that is needed is in the area of number theory, which is covered inChapter 8.
The reader who has skipped Chapters 4 and 5 should first review the material onSections 4.1 through 4.3.

The two most widely used general-purpose public-key algorithms are RSA and elliptic curve, with RSA enjoying much wider acceptance.
The reader may wish to skip the material on elliptic curve cryptography in Chapter 10, at least on a first reading. In Chapter 12, Whirlpool
and CMAC are of lesser importance.
Part Three and Part Four are relatively independent of each other and can be read in either order. Both parts assume a basic
understanding of the material in Parts One and Two.
[Page 4]

0.3. Internet and Web Resources

There are a number of resources available on the Internet and the Web to support this book and to help one keep up with
developments in this field.

Web Sites for This Book

A special Web page has been set up for this book at WilliamStallings.com/Crypto/Crypto4e.html. The site includes the following:

Useful Web sites: There are links to other relevant Web sites, organized by chapter, including the sites listed in this section
and throughout this book.

Errata sheet: An errata list for this book will be maintained and updated as needed. Please e-mail any errors that you spot to
me. Errata sheets for my other books are at WilliamStallings.com.

Figures: All of the figures in this book in PDF (Adobe Acrobat) format.

Tables: All of the tables in this book in PDF format.

Slides: A set of PowerPoint slides, organized by chapter.

Cryptography and network security courses: There are links to home pages for courses based on this book; these pages
may be useful to other instructors in providing ideas about how to structure their course.

I also maintain the Computer Science Student Resource Site, at WilliamStallings.com/StudentSupport.html. The purpose of this site
is to provide documents, information, and links for computer science students and professionals. Links and documents are organized
into four categories:

Math: Includes a basic math refresher, a queuing analysis primer, a number system primer, and links to numerous math sites

How-to: Advice and guidance for solving homework problems, writing technical reports, and preparing technical presentations

Research resources: Links to important collections of papers, technical reports, and bibliographies

Miscellaneous: A variety of other useful documents and links

Other Web Sites

There are numerous Web sites that provide information related to the topics of this book. In subsequent chapters, pointers to specific
Web sites can be found in the Recommended Reading and Web Sites section. Because the addresses for Web sites tend to change
frequently, I have not included URLs in the book. For all of the Web sites listed in the book, the appropriate link can be found at this
book's Web site. Other links not mentioned in this book will be added to the Web site over time.
[Page 5]

USENET Newsgroups

A number of USENET newsgroups are devoted to some aspect of cryptography or network security. As with virtually all USENET
groups, there is a high noise-to-signal ratio, but it is worth experimenting to see if any meet your needs. The most relevant are

sci.crypt.research: The best group to follow. This is a moderated newsgroup that deals with research topics; postings must
have some relationship to the technical aspects of cryptology.

sci.crypt: A general discussion of cryptology and related topics.

sci.crypt.random-numbers: A discussion of cryptographic-strength random number generators.

alt.security: A general discussion of security topics.

comp.security.misc: A general discussion of computer security topics.

comp.security.firewalls: A discussion of firewall products and technology.

comp.security.announce: News, announcements from CERT.

comp.risks: A discussion of risks to the public from computers and users.

comp.virus: A moderated discussion of computer viruses.


[Page 6]

Chapter 1. Introduction

1.1 Security Trends

1.2 The OSI Security Architecture

1.3 Security Attacks

Passive Attacks

Active Attacks

1.4 Security Services

Authentication

Access Control

Data Confidentiality

Data Integrity

Nonrepudiation

Availability Service

1.5 Security Mechanisms

1.6 A Model for Network Security

1.7 Recommended Reading and Web Sites

1.8 Key Terms, Review Questions, and Problems

Key Terms

Review Questions

Problems
[Page 7]

The combination of space, time, and strength that must be considered as the basic elements of this theory
of defense makes this a fairly complicated matter. Consequently, it is not easy to find a fixed point of departure.

On War, Carl Von Clausewitz

Key Points

The OSI (open systems interconnection) security architecture provides a systematic framework for defining
security attacks, mechanisms, and services.

Security attacks are classified as either passive attacks, which include unauthorized reading of a message
of file and traffic analysis; and active attacks, such as modification of messages or files, and denial of
service.

A security mechanism is any process (or a device incorporating such a process) that is designed to
detect, prevent, or recover from a security attack. Examples of mechanisms are encryption algorithms,
digital signatures, and authentication protocols.

Security services include authentication, access control, data confidentiality, data integrity,
nonrepudiation, and availability.

The requirements of information security within an organization have undergone two major changes in the last several decades.
Before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided
primarily by physical and administrative means. An example of the former is the use of rugged filing cabinets with a combination lock for
storing sensitive documents. An example of the latter is personnel screening procedures used during the hiring process.

With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer
became evident. This is especially the case for a shared system, such as a time-sharing system, and the need is even more acute for
systems that can be accessed over a public telephone network, data network, or the Internet. The generic name for the collection of tools
designed to protect data and to thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use of networks and communications
facilities for carrying data between terminal user and computer and between computer and computer. Network security measures are
needed to protect data during their transmission. In fact, the term network security is somewhat misleading, because virtually all
business, government, and academic organizations interconnect their data processing equipment with a collection of interconnected
[1]
networks. Such a collection is often referred to as an internet, and the term internet security is used.

[1]
We use the term internet, with a lowercase "i," to refer to any interconnected collection of networks. A corporate
intranet is an example of an internet. The Internet with a capital "I" may be one of the facilities used by an
organization to construct its internet.

[Page 8]

There are no clear boundaries between these two forms of security. For example, one of the most publicized types of attack on
information systems is the computer virus. A virus may be introduced into a system physically when it arrives on a diskette or optical disk
and is subsequently loaded onto a computer. Viruses may also arrive over an internet. In either case, once the virus is resident on a
computer system, internal computer security tools are needed to detect and recover from the virus.

This book focuses on internet security, which consists of measures to deter, prevent, detect, and correct security violations that involve
the transmission of information. That is a broad statement that covers a host of possibilities. To give you a feel for the areas covered in
this book, consider the following examples of security violations:

1. User A transmits a file to user B. The file contains sensitive information (e.g., payroll records) that is to be protected from
disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file
during its transmission.

2. A network manager, D, transmits a message to a computer, E, under its management. The message instructs computer E to
update an authorization file to include the identities of a number of new users who are to be given access to that computer.
User F intercepts the message, alters its contents to add or delete entries, and then forwards the message to E, which
accepts the message as coming from manager D and updates its authorization file accordingly.

3. Rather than intercept a message, user F constructs its own message with the desired entries and transmits that message to E
as if it had come from manager D. Computer E accepts the message as coming from manager D and updates its
authorization file accordingly.

4. An employee is fired without warning. The personnel manager sends a message to a server system to invalidate the
employee's account. When the invalidation is accomplished, the server is to post a notice to the employee's file as
confirmation of the action. The employee is able to intercept the message and delay it long enough to make a final access to
the server to retrieve sensitive information. The message is then forwarded, the action taken, and the confirmation posted.
The employee's action may go unnoticed for some considerable time.

5. A message is sent from a customer to a stockbroker with instructions for various transactions. Subsequently, the investments
lose value and the customer denies sending the message.

Although this list by no means exhausts the possible types of security violations, it illustrates the range of concerns of network security.

[Page 9]

Internetwork security is both fascinating and complex. Some of the reasons follow:

1. Security involving communications and networks is not as simple as it might first appear to the novice. The requirements
seem to be straightforward; indeed, most of the major requirements for security services can be given self-explanatory
one-word labels: confidentiality, authentication, nonrepudiation, integrity. But the mechanisms used to meet those
requirements can be quite complex, and understanding them may involve rather subtle reasoning.

2. In developing a particular security mechanism or algorithm, one must always consider potential attacks on those security
features. In many cases, successful attacks are designed by looking at the problem in a completely different way, therefore
exploiting an unexpected weakness in the mechanism.

3. Because of point 2, the procedures used to provide particular services are often counterintuitive: It is not obvious from the
statement of a particular requirement that such elaborate measures are needed. It is only when the various countermeasures
are considered that the measures used make sense.

4. Having designed various security mechanisms, it is necessary to decide where to use them. This is true both in terms of
physical placement (e.g., at what points in a network are certain security mechanisms needed) and in a logical sense [e.g., at
what layer or layers of an architecture such as TCP/IP (Transmission Control Protocol/Internet Protocol) should mechanisms
be placed].

5. Security mechanisms usually involve more than a particular algorithm or protocol. They usually also require that participants
be in possession of some secret information (e.g., an encryption key), which raises questions about the creation, distribution,
and protection of that secret information. There is also a reliance on communications protocols whose behavior may
complicate the task of developing the security mechanism. For example, if the proper functioning of the security mechanism
requires setting time limits on the transit time of a message from sender to receiver, then any protocol or network that
introduces variable, unpredictable delays may render such time limits meaningless.

Thus, there is much to consider. This chapter provides a general overview of the subject matter that structures the material in the
remainder of the book. We begin with a general discussion of network security services and mechanisms and of the types of attacks they
are designed for. Then we develop a general overall model within which the security services and mechanisms can be viewed.
[Page 9 (continued)]

1.1. Security Trends

In 1994, the Internet Architecture Board (IAB) issued a report entitled "Security in the Internet Architecture" (RFC 1636). The report stated
the general consensus that the Internet needs more and better security, and it identified key areas for security mechanisms. Among these
were the need to secure the network infrastructure from unauthorized monitoring and control of network traffic and the need to secure
end-user-to-end-user traffic using authentication and encryption mechanisms.

[Page 10]

These concerns are fully justified. As confirmation, consider the trends reported by the Computer Emergency Response Team (CERT)
Coordination Center (CERT/CC). Figure 1.1a shows the trend in Internet-related vulnerabilities reported to CERT over a 10-year period.
These include security weaknesses in the operating systems of attached computers (e.g., Windows, Linux) as well as vulnerabilities in
Internet routers and other network devices. Figure 1.1b shows the number of security-related incidents reported to CERT. These include
denial of service attacks; IP spoofing, in which intruders create packets with false IP addresses and exploit applications that use
authentication based on IP; and various forms of eavesdropping and packet sniffing, in which attackers read transmitted information,
including logon information and database contents.

[Page 11]

Figure 1.1. CERT Statistics


(This item is displayed on page 10 in the print version)

[View full size image]


Over time, the attacks on the Internet and Internet-attached systems have grown more sophisticated while the amount of skill and
knowledge required to mount an attack has declined (Figure 1.2). Attacks have become more automated and can cause greater amounts
of damage.
Figure 1.2. Trends in Attack Sophistication and Intruder Knowledge

[View full size image]

This increase in attacks coincides with an increased use of the Internet and with increases in the complexity of protocols, applications, and
the Internet itself. Critical infrastructures increasingly rely on the Internet for operations. Individual users rely on the security of the Internet,
email, the Web, and Web-based applications to a greater extent than ever. Thus, a wide range of technologies and tools are needed to
counter the growing threat. At a basic level, cryptographic algorithms for confidentiality and authentication assume greater importance. As
well, designers need to focus on Internet-based protocols and the vulnerabilities of attached operating systems and applications. This book
surveys all of these technical areas.
[Page 12]

1.2. The OSI Security Architecture

To assess effectively the security needs of an organization and to evaluate and choose various security products and policies,
the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the
approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local
and wide area networks, the problems are compounded.

[2] [3]
ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The OSI security architecture is
useful to managers as a way of organizing the task of providing security. Furthermore, because this architecture was developed as an
international standard, computer and communications vendors have developed security features for their products and services that
relate to this structured definition of services and mechanisms.

[2]
The International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T) is a
United Nationssponsored agency that develops standards, called Recommendations, relating to
telecommunications and to open systems interconnection (OSI).

[3]
The OSI security architecture was developed in the context of the OSI protocol architecture, which is described
in Appendix H. However, for our purposes in this chapter, an understanding of the OSI protocol architecture is not
required.

For our purposes, the OSI security architecture provides a useful, if abstract, overview of many of the concepts that this book deals with.
The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows:

Security attack: Any action that compromises the security of information owned by an organization.

Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover
from a security attack.

Security service: A processing or communication service that enhances the security of the data processing systems and the
information transfers of an organization. The services are intended to counter security attacks, and they make use of one or
more security mechanisms to provide the service.

In the literature, the terms threat and attack are commonly used to mean more or less the same thing.Table 1.1 provides definitions taken
from RFC 2828, Internet Security Glossary.

Table 1.1. Threats and Attacks (RFC 2828)


Threat

A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security
and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

Attack

An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in
the sense of a method or technique) to evade security services and violate the security policy of a system.
[Page 13]

1.3. Security Attacks

A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of
passive attacks and active attacks. A
passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack
attempts to alter system resources or affect their operation.

Passive Attacks

Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information
that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis.

The release of message contents is easily understood (Figure 1.3a). A telephone conversation, an electronic mail message, and a
transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these
transmissions.

Figure 1.3. Passive Attacks


(This item is displayed on page 14 in the print version)

[View full size image]


A second type of passive attack, traffic analysis, is subtler (Figure 1.3b). Suppose that we had a way of masking the contents of
messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the
message. The common technique for masking contents is encryption. If we had encryption protection in place, an opponent might still be
able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could
observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the
communication that was taking place.

Passive attacks are very difficult to detect because they do not involve any alteration of the data. Typically, the message traffic is sent and
received in an apparently normal fashion and neither the sender nor receiver is aware that a third party has read the messages or
observed the traffic pattern. However, it is feasible to prevent the success of these attacks, usually by means of encryption. Thus, the
emphasis in dealing with passive attacks is on prevention rather than detection.
Active Attacks

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories:
masquerade, replay, modification of messages, and denial of service.

A masquerade takes place when one entity pretends to be a different entity F ( igure 1.4a). A masquerade attack usually includes one of the
other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence
has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those
privileges.

Figure 1.4. Active Attacks


(This item is displayed on pages 15 - 16 in the print version)

[View full size image]


Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effectFigure
( 1.4b).

[Page 14]

Modification of messages simply means that some portion of a legitimate message is altered, or that messages are delayed or
reordered, to produce an unauthorized effect (Figure 1.4c). For example, a message meaning "Allow John Smith to read confidential file
accounts" is modified to mean "Allow Fred Brown to read confidential fileaccounts."

The denial of service prevents or inhibits the normal use or management of communications facilities (Figure 1.4d). This attack may have
a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service).
Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so
as to degrade performance.

[Page 15]

Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are
available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of
potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or
delays caused by them. If the detection has a deterrent effect, it may also contribute to prevention.
Exploring the Variety of Random
Documents with Different Content
was received by one of the senior members, acting as caterer; and a
plentiful sea-stock of all necessary comforts was daily accumulating,
preparatory to our approaching cruise in the North-sea, to which
station the Astræa belonged.
About a week after my joining the ship, the captain came on
board, received me very politely, and gave me the best advice as to
my future conduct. He was an old officer who had been at sea from
his youth, possessed an excellent heart, and a most conciliating
address, blended with the bluntness and unaffected good humour
peculiar to seamen. He was advanced in years at the time I served
under him; and I perceive by a late Navy List that his long and
meritorious services have been rewarded with the post of Governor
of the Naval Asylum, an institution which does honour to the country
and the government that established it.
CHAPTER VII.
My rapid progress in Navigation.—Become a good Sailor in Theory.—The Approach
of a severe Winter somewhat damps my Pleasure.—Begin to repent my
Bargain.—Duty excessively fatiguing, and Situation uncomfortable.—Advised
to alter my Course.—Appointed Captain’s Clerk, and find myself at home to a
Peg.—The Frigate ordered up the River Thames.—I visit London.—Become
enamoured of a fair Cyprian.—Desert my Ship on her account.

In a few days, the frigate being completely equipped, was cast off
from alongside the Carolina, and all hands being on board, we
dropped down to the Nore, from whence we sailed for Yarmouth
Roads, where the admiral of the North Sea fleet was then lying;
soon after which we put to sea, on a cruise off the coast of Holland.
I immediately applied myself assiduously to the study of navigation,
in which I was so successful, that I was in a few weeks capable of
keeping a dead reckoning. It was required of the midshipmen to
deliver in daily at noon, an account of the ship’s course, distance,
&c., performed in the last 24 hours. These different calculations,
deduced from the remarks on the log-board, were presented to the
captain, who, on a comparison of the whole, formed his opinion of
the several operators’ ingenuity, and praised or censured accordingly.
I had the satisfaction to find that my performances were generally
approved of, and gained me much applause from their correctness.
This success was probably owing to the advantages I possessed over
most of my companions, in point of education, improved by
extensive practice in figures, and to a closeness of application arising
from my experience in the world, of which they (whose
acquirements were merely scholastic) were incapable. I was
remarked also for the neatness and perspicuity with which I kept my
log-book and journal, which I never suffered, like many others, to be
in arrears. I was not quite so happy in my efforts to become a good
practical sailor. I learnt indeed, with great facility, the names and
uses of every rope in the ship, and could apply to them without
hesitation on all occasions, and I had a correct idea of the
manœuvres necessary in tacking, wearing, reefing, &c., as far as
theory extended; but unhappily my constitution being naturally
delicate, and my nerves uncommonly weak, I found myself much
embarrassed, when duty or inclination prompted me to go aloft, on
which occasions I was subject to a giddiness in my head, which
rendered my situation extremely perilous, and though I endeavoured
by perseverance to overcome this weakness, I could never totally
banish the timidity with which I was affected. On this account,
though I continued indefatigable in every other point of my duty, I
desisted, particularly in blowing weather, from ascending “the high
and giddy mast;” and I am firmly persuaded that it is only by going
to sea at a very tender age, that youth in general are rendered
callous to danger, and insensible of those fears, to which I was at all
times more or less subject. It is also probable that the various
excesses in which I had indulged since I first quitted my friends, had
contributed to impair a constitution naturally fragile, and to relax still
more the nervous system. Our first cruise produced no incident
worth notice. We maintained our station, when the weather would
permit, off the Texel, and were frequently so near the land, that we
could distinguish and count the Dutch fleet, lying at anchor in that
harbour, from our mast-head: but Mynheer was not disposed to put
to sea, of which event we were ordered to convey immediate
intelligence to the admiral. The winter was now approaching, and
there was every appearance of its proving unusually inclement.
During this cruise, we lay-to for twenty-one successive days, in a
tremendous gale from the N. E., with only a storm jib, and fly-sail
set; and although we were in no immediate danger, having good
sea-room, and a tight ship, I found my ardour for a sea-faring life
considerably abated. I was obliged to turn out of a warm bed at 12
or 4 o’clock in each night, to take my watch, the hardship of which
duty was a severe penance upon me. The excessive cold, added to
loss of rest, produced a drowsiness which rendered me incapable of
resisting the inclination I felt to sleep, whenever I could retire to a
private spot unobserved; which was generally in the long-boat,
under a gun carriage, or some such hiding place. I was, however,
frequently discovered in my retreat, by accident, or by the
mischievous information of some watch-mate, whose hardy frame
was proof against fatigue. On those occasions the lieutenant of the
watch would order the rest of the midshipmen to throw a horse-
bucket of salt-water over me, which did not fail to awaken me
quickly: but on starting up, shivering and amazed, I could never
ascertain the perpetrators of this ablution, who having disappeared,
would come up to me, very gravely condoling on my misfortune,
which they stated to proceed from a grampus having blown over me
from alongside. This piece of sea wit, which I soon understood,
produced a general laugh at my expense; how ever I was as ready
at other times to practise the same exploit upon some other unlucky
sleeper; and my chief consolation was, that the farce always ended
with the sufferer being ordered to take off his wet clothes, and turn
in to his hammock, which sometimes saved two or three hours on
deck. At other times, sleeping on our watch, or other instances of
remissness in duty, were not so slightly passed over; we were
sometimes sentenced to sit on the main-top-mast head, for two,
four, and sometimes eight hours; at other times to sit on the
weather cat-head, exposed to a cutting wind; and other similar
punishments, depending on the humour or severity of the officer of
the watch. In addition to the hardships and fatigues of duty, I began
to find my situation in the mess grow daily more irksome. I soon
perceived that a midshipman’s birth (or mess-room) is an epitome of
the world at large, the weaker party goes to the wall, and is subject
to many insults and impositions from those who are his superiors in
seniority, strength, or interest. There were also frequent instances of
intrigue and treachery; and as among so many persons there must
be various dispositions, there were not wanting envious and
malicious minds, whose delight was in fomenting mischief and
detraction. Being naturally of a peaceable turn, hating nothing so
much as a life of dissension, and abhorring tyranny of every
description, I now wished myself emancipated from this state of
bondage, as to me it seemed; and I discovered, when too late, that
“all is not gold that glitters,” and that the situation of a midshipman
(which I had once considered the summum bonum of honour and
happiness) was not, any more than others, wholly free from care
and inquietude. However I continued to weather the gale, as well as
I could; and conscious of the rectitude of my intentions, suffered
patiently those little mortifications I had not power to avert.
After a cruise of two months, we returned to port, when I had the
pleasure of hearing from my respected friends in S⸺shire. Our
stay in Yarmouth roads was short; we put to sea again in company
with several smaller vessels, of which our captain was commodore. A
violent storm, however, soon dispersed our little squadron, and we
at length with much difficulty gained the river Humber, from whence
we returned to Yarmouth. During this winter we were continually at
sea, except for very short intervals; and the oldest seaman in the
ship declared they had never known a more tempestuous season.
Several fine frigates, sloops, brigs, &c., were lost in the North Sea,
and on the northern coasts of England. My hardships, of course,
rather increased than diminished, and I heartily repented the step I
had taken; not that I disliked the service, or the mode of living on
ship-board; but I found myself unequal to the duty of watching, &c.,
and was also uncomfortably situated with respect to my messmates,
whose manners and ideas of enjoyment did not coincide with mine.
The notion of finding pleasure in books was ridiculed by them; and I
was sometimes told that I ought to have been a parson; but it was
agreed on all sides, that I was better adapted for a clerk than a
sailor. These hints and suggestions were not thrown away upon me;
I felt the force of their justice, and longed for an opportunity of
ameliorating my situation which at length, to my great joy,
unexpectedly occurred.
The captain’s clerk I have before mentioned was, by the interest
of Captain Dacres, promoted to the rank of purser; and as soon as
this was known, my brother Mids unanimously advised me, in the
sea phrase, to “bear up” for a scribe; meaning to quit my present
station, and petition the captain to receive me as his clerk. I took
this advice, and was happy enough to succeed. As I had spent much
of my time with my predecessor, and took pleasure in observing his
various public accompts, in the execution of which I had often
assisted him, I required but little instruction to enable me to
undertake this office.
I must not omit to notice here, a laughable incident, consequent
on my dereliction. The midshipmen in general, on the day of my
appointment, surrounded me in our cabin, and with great ceremony,
proceeded to cut off the weekly accompts[6] from the coat I had on;
proclaiming, at the same time, that I had now assumed a different
character, and had no further right to the honourable uniform of a
Mid. I was obliged, therefore, to have this appendage taken from
every coat and jacket I possessed.
Behold me now once more in my own sphere! Though I had
relinquished the hope of ever becoming an admiral, yet here was
another field for promotion opened for me. After a service of two
years, I might obtain a purser’s warrant, which, though a less
honourable station than the former, is perhaps more lucrative, and
certainly less exposed to danger.
I had now a commodious cabin to myself, in which I was free from
interruption, only frequenting the mess cabin at meal times, or when
I was inclined for company. I slept peaceably in my cot, while my
former companions were exposed to the wind and weather upon
deck. As to the duties of my office, they were merely a source of
pleasing amusement to me: I soon became expert in their
performance; and my attention gained me the esteem of both
captain and purser.
It is needless to trouble the reader with a journal of the ship’s
proceedings, during the remainder of the time I continued in her; it
may suffice to state briefly, that we took many cruises in the North
Sea, in the course of which we visited the Orkney Isles, Leith Roads,
the River Humber, Osely Bay, Robin Hood’s Bay, Harwich Harbour,
and other anchorages on the coasts of England and Scotland, to
which we were driven by stress of weather, or other causes. In one
of our cruises, we captured a beautiful French lugger privateer, of
fourteen guns, and fifty-eight men, belonging to Dunkirk, after a
chase of three hours, in a gale of wind, in which we went at the rate
of thirteen and a half knots per hour, under a fore-sail and close
reefed main top-sail only. During the ensuing summer, being
appointed to convoy above three hundred sail of merchantmen to
the Baltic Sea, we lay for several weeks at Elsineur, in Denmark; at
which place I went on shore, and had some pleasant rambles into
the adjacent country, visiting Copenhagen which is twenty miles
distant. I also viewed the interior of that ancient castle, celebrated
by Shakspeare in the tragedy of Hamlet, and many other local
curiosities.
The following spring, the Astræa was ordered up the river
Thames, for the purpose of receiving on board two hundred
thousand pounds in specie, which she was to convey to Cuxhaven,
for the use of the Hamburgh merchants. We accordingly came to an
anchor at Greenhithe, sixteen miles from London; and while the ship
was undergoing some little repairs, I obtained leave of absence for
three days, of which I availed myself to visit London, with the view
of having a short cruise in that region of pleasure. As I had lately
received both pay and prize-money, and had also been economical
of what my relations had occasionally remitted me, I was well
provided for the purpose.
On the first night of my arrival in town, I went, of course, to the
play, where I was struck with the appearance of a very interesting
young Cyprian, whom I immediately accosted, and after the
performance, attended to her apartments in Bury-Street, St. James’s.
Here every thing was upon the most elegant scale, and I was so well
pleased with my quarters as well as with the lady, that I did not stir
tack or sheet (except on short excursions of pleasure in which she
accompanied me) until the expiration of my liberty, and then it was
with much reluctance, I could tear myself from this fascinating fair
one. I was the more charmed with her, as she exhibited a generosity
of mind, seldom met with in females of her description: and though
she might have extracted from me my last shilling, yet she was so
far from being mercenary, that my expenses, considering the
enjoyments I had experienced, were comparatively trifling. I
returned, then, to my ship in due time, but still the thoughts of the
lovely Miss K⸺e incessantly recurred, and prevented my enjoying
a moment’s peace. My anxiety was increased by receiving a most
affectionate letter from her, within three days, according to a
promise she had given me at parting, in which she earnestly
requested my leave to visit me on board prior to our sailing. To this I
would not, however, consent, but gave a sort of conditional promise,
almost indeed amounting to a positive one, that I would see her
again in town.
About a week after my return from London, I resolved to pay a
second visit to my inamorata; but as we were now ready for sea,
and expected the specie on board every hour, it was in vain to solicit
leave. I therefore determined to go ashore early as if to spend the
day, which the whole of the petty officers were allowed to do in turn.
My intention was to go post to London, and after a day and a night’s
pleasure, to return on board early the next morning, as I could easily
frame some excuse for staying ashore all night.
From some secret presentiment, however, which I conceived at
the moment I was about to step in the jolly-boat, I hurried down to
my chest, and hastily filling a clothes-bag with linen, gave it to one
of the boys, as if to take to the washerwoman, and immediately
quitted His Majesty’s ship Astræa (as the event proved) never more
to return. I procured a man to carry my bag to Dartford, a post town
three miles from Greenhithe, and fifteen from London; from whence
I took a chaise, and in less than two hours found myself in the arms
of my fair enslaver. In order to give the reader leisure to reflect on
the blindness of mankind to their own welfare, and to revile me in
particular, as I deserve, for this mad and unjustifiable conduct, I
shall put an end to this Chapter.
CHAPTER VIII.
Consequences of my imprudent Secession.—Reduced to great Distress.—Become a
Billiard-player.—Associate with Sharpers.—Engage with a Country Attorney.—
Take leave of London once more.

The reader will here observe that I had left behind me, on my
desertion, a valuable chest of clothes, books, &c. &c., the purchase
of which, but sixteen months before, had cost my affectionate
friends a large sum; and I had now, by this rash act, defeated their
fondest hopes, and brought disgrace as well on them as on the
worthy officer who procured me the appointment. It is impossible,
however, for my reader to condemn my folly, or rather wickedness,
in stronger terms than my own conscience has ever since done.
Surely there must, let moralists argue as they will, be something like
a fatality which governs the fortunes of some, if not all, men; and
which impels them headlong to their ruin, against the voice of
reason and of conscience, and the dictates of common sense. But
the retrospect affects me too much: I must not aggravate my
present sufferings by dwelling longer on what will not bear
reflection. All I can now do is to repent of all my errors; and I trust
that Divine Power will accept my repentance who best knows its
sincerity.
Before I resume the thread of my narrative, I will just venture to
give the reader a few lines, descriptive of a midshipman’s life, which
will require, I trust, no apology, when I state that they were the
production of some of the junior members of our mess, and
composed in the space of a very few hours.—Of the correctness of
the picture therein drawn, I can truly say, probatum est.

VERSES
Written on Board His Majesty’s Ship, the
Astræa, by the younger Midshipmen
of that Frigate, 1798.

I.
When in the Cockpit[7] all was dim,
And not a Mid dar’d shew his glim[8];
A youth was left alone:
He scratch’d his head; survey’d his clothes;
Then took the other cheering dose[9];
And thus began his moan:—

II.
Ah! cursed be that fatal day,
When I from home was led astray,
In this d⸺’d place to dwell:
Oh! had I in the country stay’d
I might have learnt some useful trade,
And scorn’d the white lapelle[10].

III.
When first on board the ship I went,
My belly full, my mind content,—
No sorrows touch’d my heart:
I view’d my coat, so flash and new,
My gay cockade, and hanger too,
And thought them wondrous smart.

IV.
But now, alas! my coat is rent;
My hanger’s pawn’d; my money spent;
My former friends I’ve miss’d;
And when of hardships I complain,
My messmates swear ’tis all in vain;
And cry, “What made you list?”
V.
But hark! I hear the corp’ral’s tread[11]:
Another dose, and then to bed;
Of ev’ry joy bereft;
I shake my bottle with a doubt;
My poor half-pint[12] is quite drain’d out;
Not one kind drop is left!

VI.
The youth with indignation burns;
Into his hated hammock turns;
Alas! not long to sleep:
The quarter-master, with hoarse tongue,
Awakes him; says, “The bell has rung:”
He’s rous’d, his watch to keep.

VII.
Shiv’ring he walks the quarter-deck,
Dreading the stern lieutenant’s check,
Who struts the weather-side[13];
With glass and trumpet in his hand[14],
He bellows forth his harsh command,
With arrogance and pride.
After the first transports of our meeting had subsided, it was
mutually agreed that I should reside altogether with Miss K⸺e,
who, being ignorant of my real circumstances, imagined I was
capable of maintaining her and myself, if not in the most splendid, at
least in a comfortable manner. I should have stated, however, that
the pleasure I felt at being once more free from control, and on my
near approach to my favourite spot, London, added to the passion I
had conceived for this young lady, had completely banished every
idea of returning to my ship, long before I was set down at the
obelisk in St. George’s Fields, where I had exchanged my chaise for
a hackney coach, to prevent my being traced.
The following morning I examined into the state of my personal
effects; which I found to consist of a dozen fine shirts, about the
same number of neck-cloths, hose, and waistcoats, a few odd
articles of other apparel, and twenty-one pounds in money, together
with an old family gold watch, and the suit of blue I had on my back.
My fair acquaintance evinced some concern at the rash step I had
taken; which, imputing wholly to my affection for herself, drew from
her professions of gratitude and constancy, which I believe (from her
youth and ingenuous mind) to have been sincere. I determined now
to domesticate myself with this charming woman for a few weeks;
as well to make up for the privations I had suffered for the last
sixteen months, by enjoying every comfort money could procure, as
to preclude any risk of being apprehended for desertion before the
ship’s departure.
During this retirement, which I might justly call a honeymoon,
from the happiness I experienced, I obtained from Miss K⸺e some
account of herself, and the misfortunes which had reduced her to
the disgraceful situation in which I found her. The following are the
particulars:—
She was the second daughter of a respectable tradesman in the
city, who had placed her, with her elder sister, at a boarding school
in Queen-square, where she had become perfectly accomplished.
About a year before our acquaintance began, she had been
accidentally seen walking in the garden of the square, to which the
young ladies had access, by an officer of dragoons, who, being
struck with her beauty, had employed every art of bribery and
intrigue, first to open a correspondence by letter, and afterwards to
obtain a personal interview, of which opportunity he made such
good use that he succeeded in seducing this amiable child, then just
fifteen years of age, to elope from her school, to sacrifice to him,
honour, fortune, and parental affection, and entail on herself ruin,
remorse, and endless shame!
This gallant hero treated her with the fondest attention, and
spared no expense to gratify her every wish, and, by a continual
round of splendid dissipation, to banish any reflections which might
otherwise obtrude themselves; and in this (owing to her youth and
the natural levity of her sex,) he so far succeeded that she felt not,
for the first six months, those compunctions which, sooner or later,
must attend conscious guilt. At the end of that time, however, her
protector, being ordered abroad with his regiment, left her with a
slender provision in possession; but for which he made up with most
liberal promises of future bounty. It is probable he had by this time
gratified a passion which was at first but of a sensual nature; and I
am led to think his going abroad was only a fiction, the better to
cover his base design of deserting her: be this as it might, she had
never since heard from him; and, as her little money was soon
exhausted, she found herself alone and friendless, and now first
began to reflect on the consequences of her imprudence. She had,
on quitting the school, assumed the name of K⸺e, which I have
recorded her by, in order to avoid the inquiries of her family; to
whom shame and (perhaps false) delicacy, now deterred her from a
thought of returning. In the late scenes of her guilty prosperity she
had formed an acquaintance with several kept women who were
living, like herself, in elegant infamy. She now had recourse to some
of these friends for temporary assistance; but alas! they soon
convinced her how little is to be expected from such friendship,
when adversity renders it most essential. In a fatal moment she took
the usual course of persons similarly situated; she procured a
suitable lodging where her misfortunes were not known, and
frequented the theatres and other public places; at which (being a
new face on the town), she was successful above all her competitors
in attracting the notice of the male sex. The pecuniary emoluments
she thence derived had enabled her to live elegantly; and her person
and carriage were so much above the common class of Cyprians that
she was still, at the time I first saw her, an object of general
admiration. Fortunately also her health was yet untainted, so that,
could I have found means for our mutual support, this connexion
promised to be a source of happiness to us both. She felt happy at
the opportunity of quitting a course of life which had always
disgusted her; and little regret for the past (being ignorant of the
true state of my finances) save when a melancholy thought of her
disconsolate family caused a temporary effusion of grief.
The first month or honeymoon of our connexion being expired,
and the Astræa long departed from the river, I began to revolve in
my mind the means of future subsistence. As I had spared no
expense to render our retirement pleasing, and had purchased for
myself a suit of plain clothes, I now found myself reduced to my last
guinea, and I knew that unless I hit upon some mode of speedily
recruiting, I must have recourse to the pawnbroker for another.
These unpleasing reflections gave me much uneasiness; but I
carefully concealed it from my partner, and preserved the same air
of cheerfulness as before. At length came “th’ inevitable hour.”
Money was wanting for household purposes, and I was obliged to
raise a few pounds, by depositing my watch in the usual place of
security. I accounted for the absence of this article by a pretence
that it wanted repair. This small supply lasted but a fortnight, as we
retrenched nothing of our mode of living; and I had lately
accompanied my dear Sarah to the theatres, and other places of
diversion, for which amusement she had as violent a passion as
myself. But I have now to relate an event, which no less afflicted
than surprised me, and of which I had not the most distant
apprehension.
One night, towards the close of the last mentioned period, we had
returned late from the opera, and, being in high spirits though low in
pocket, I proposed to send for a small collation from the
neighbouring tavern, and to indulge in a little extra festivity: this was
approved of by my charmer, who indeed had no will but mine; and,
our little maid having procured the necessary requisites, we enjoyed
a most comfortable supper; after which we circulated the cheering
glass, the wine receiving an additional zest from the wit and
enlivening conversation of my fair companion. But mark the
uncertainty of human happiness!
About two o’clock, as we were on the point of retiring to rest, we
were surprised by a sudden and loud knock at the street door, which
being unusual at so late an hour, caused a momentary alarm to us
both. Before we had time to form any idea of the cause, the door of
our apartment was burst rudely open, and three persons entered, at
the sight of whom, my unfortunate girl fainted in my arms, on the
sofa whereon we sat. One of the three persons, a respectable
looking elderly gentleman, from his tender anxiety, but mixed with
some degree of severity, I soon conjectured to be her unhappy
father; in which I was not mistaken. The other two immediately
called the landlady of the house, by whose assistance they
recovered the poor girl from her swoon; which having accomplished,
they instantly hurried her down stairs, the old gentleman darting an
angry look at me, and left me so stupified with grief and surprise,
that I had not power to follow, or notice their proceedings. I soon
afterwards heard a coach drive from the door, on which the latter
was immediately shut, and the landlady coming up, informed me of
what she had gathered during a short conversation from the parties.
It appeared that the young lady had been seen with me the
preceding night at the opera-house, by a friend of her family, who
knowing of her elopement, had officiously followed us home, and
then immediately given information to her father, who applying
instantly to Sir William Ford, the Bow-Street magistrate, that
gentleman had detached Messrs. Townshend and Carpmeal (two of
his principal officers) to assist him in the recovery of his lost child.
This they had effected as I have described; the anxiety of her parent
not suffering him to defer the business even till the ensuing day. The
woman added that on learning from her, the life his daughter had
led for some months prior to her acquaintance with me, and that I
was not her original seducer, he had declined the idea of
apprehending me, which the officers were otherwise empowered to
do.
This melancholy event was a grievous affliction to me, who had
relinquished an honourable situation, purely on her account; and
was now not only deprived of a beloved object, but reduced to a
state of utter poverty. Notwithstanding every inquiry I could
institute, I could never obtain any further information as to the fate
of Miss K⸺e, than what I extracted by a bribe from one of the
officers, who assured me that it was her father’s intention to send
her to a remote part of the kingdom, where she had a female
relation who had undertaken the care of her: but this man declared
that the name of her parents was known only to the magistrate,
which was perhaps true: and the dear girl had never even disclosed
her real name to myself, but had almost promised so to do on a little
longer acquaintance.
I now quitted this lodging, the wearing apparel of my late
companion being claimed by the landlady for some arrears of rent,
as the father had refused to take any thing from the house, and
never approached it more. I engaged a small apartment for myself
in a more centrical situation; and, to supply my immediate wants,
deposited one article after another at the pawnbroker’s, till I had no
longer any thing left to deposit.
It was necessary, however, before my appearance became too
shabby, to find some means of support. As to my friends, I had
given up every idea of returning to them, nor did I, for some months
after this, acquaint them of the rash step I had taken: and when I
afterwards did so, I amused my poor grandfather with a fictitious
account of my having returned to the law, and assured him that I
was doing well; for as I have before hinted, I was so sensible of the
inconvenience which that worthy man must unavoidably suffer in his
old age, from his too great liberality to me, that I determined to
submit to any hardships rather than be a further incumbrance upon
him.
I had, during my former residence in London, taken great delight
in billiards, and, by a frequent attendance at public tables, had
become a tolerably good player. I had renewed my acquaintance
with this game, since my last arrival in town; and, urged by
necessity, I now deemed it possible to pick up a little money at one
of these boards of green cloth. For this purpose I attended daily at
the rooms in Bow-Street, Covent Garden, where, by a few days play
with the marker, I gained a knowledge of the tables; and, as nothing
contributes like practice to improve one at this scientific game, I was
soon enabled to engage with such gentlemen as accidentally
dropped in for an hour’s amusement, which I obligingly afforded
them at the expense of a few shillings.
These opportunities, however, only occurred in the early part of
the day; for in the evenings, the tables, as well as the spoil, were
engrossed by a combination of five or six sharpers, who regularly
attended for the same purpose as myself; but their operations were
upon a more extensive scale: by forming sham matches among
themselves, engaging by-standers to bet on either side, and then
playing booty, and by various other expedients, they frequently
obtained large sums, and were enabled to appear genteelly about
town. These gentry soon viewed me with a jealous eye; regarding
me, I suppose, as an interloper, who encroached upon their rights of
plunder. I therefore found it would be necessary to have an
understanding with their party, by which means I should reap a
much better harvest than I could do by a mere course of fair play, in
which I was sometimes unavoidably beat. I at length effected my
object, by means of an elderly man, whose good-natured
countenance encouraged me to introduce a conversation on the
subject. This person, who was a veteran in the arts of play, and of
some consequence in the gang, seemed flattered by the respectful
manner in which I addressed him, and, complimenting me on the
talents I possessed, assured me I should receive from himself every
advice requisite to render me useful; and that I might depend on the
most equitable treatment in the division of any money I might be
accessary to obtaining.
I was the same evening formally accepted as a member of this
sharping fraternity; and after a libation at the Piazza coffee-house,
they repaired to the scene of action, where I soon afterwards
dropped in, as if by accident; and, having played a few games with
the marker, in which I betrayed great want of skill, I was at length
challenged by one of our party, who had been seen at other times to
play well. Of course, bets in plenty were offered against me; and in
the middle of the game, pretending to be irritated at the general
discouragement of the by-standers, I affected to grow warm, and
took odds of several gentlemen, that I won the game (which was
now six to four against me); my antagonist also backed himself by
laying the same odds with some of our confederates, after which, no
more bets being offered, he relaxed a little in his play. I improved in
proportion, and having, for form’s sake, suffered the game to arrive
at twenty all, the flats (or strangers) began to look foolish, and
endeavoured to hedge off, as the phrase is, but without effect. I
therefore made a successful hazard, and decided the game, to the
great chagrin of those who had so warmly opposed me. The person
who played with me, declared I had won by mere luck, and random
play, and, throwing down his bets with a passionate air, swore he
would play me the following day for a larger sum, and give me five
points. This finesse prevented any suspicion in the minds of the
losers, whom it was our interest to keep ignorant of the combination
existing. The room soon after getting thin, we departed one at a
time, and meeting at the usual place, apportioned the division of the
evening’s profit, which amounted to about thirty pounds.
I continued to associate with this knot of gamblers for several
weeks; but I soon found that our success was very uncertain,
depending upon the number of strangers who happened to visit the
rooms; as those who had once been duped by us, were always
cautious in future, and would neither play nor bet with us. It was
only, therefore, from gentlemen who were not in the habit of
frequenting this house, that we had a chance of gaining any thing
worth notice: so that upon the whole, what I acquired was barely
sufficient to keep me above want. The summer too, having now
commenced, at which season there is but little company at the
billiard rooms, the confederates to whom I had attached myself, left
town upon a tour to the different races, some with an E O table,
others trusting to their general abilities at hazard playing, cocking,
&c. As I had neither found the pleasure or profit which I derived
from a connexion with them to afford that satisfaction I expected, I
was not concerned at a separation from them. I therefore rubbed on
as well as I could by myself, spending my leisure time much in my
usual manner, but always taking care to preserve a genteel
appearance, on which I knew every success depended.
As I was one morning reading the papers at the coffee-house
where I commonly breakfasted, I met with an advertisement for a
clerk to an attorney in the country. As this was a situation I had
never held, and the season of the year was favourable to an
excursion, I determined to offer my services, promising myself, at
least, to derive some benefit to my health, and amusement from
changing the scene; but I had always a partiality for London, and
could never wholly reconcile myself to a country life, since I first
tasted of the various pleasures with which the metropolis abounds.
I immediately applied to the advertising parties, Messrs. Dalton
and Edwards, in King’s Bench Walk, Temple, and was introduced to
the latter gentleman, who informed me it was a Mr. Dalton of Bury
St. Edmunds, who wanted a clerk capable of conducting his
business. As I had acquired a greater share of experience, and a
better insight of the different branches of the profession, than many
others would do in a much longer course of service, I hesitated not
to undertake the duties required; and as expedition was necessary,
Mr. Edwards, after some few inquiries, engaged me immediately at a
weekly salary of one pound, which in so cheap a part of the country,
he observed, was equal to twice the sum in London. He desired me
if possible, to set out that very day, and writing a short letter of
introduction to Mr. Dalton, gave it me, together with a small sum to
bear my expenses to Bury. I then took my leave, and having gained
the street, I was curious to know in what terms my credentials ran.
The wafer being still wet, I opened the letter, in which Mr. Edwards
had briefly stated the agreement he had made with me, and
concluded in these words: “I have every reason to believe him an
expert clerk, and do not doubt but he will prove an acquisition.” How
far this good gentleman’s prediction was verified, the next Chapter
will disclose. I lost no time in preparing for my journey, and having
but few clothes to pack up, I took my departure from the Blue Boar
in Bishopsgate-street, at seven o’clock, P. M., and the next morning
arrived at St. Edmundsbury.
CHAPTER IX.
Account of my Situation at Bury St. Edmunds.—Obstinately determine to relinquish
it, and return to London.—Defraud several Tradesmen.—Quit the Town, and
arrive in the Metropolis.—Obtain a quantity of Wearing Apparel under false
Pretences.

I found Mr. Dalton to be a gentleman of high respectability in his


profession, and of the most prepossessing manners. He gave me a
very kind and polite reception, and after some conversation,
conducted me himself to the best inn in the town, where he ordered
that I should be entertained at his expense, until I could provide
myself a convenient residence. Mr. Dalton had a very handsome
house, and kept several servants, but, being a bachelor and a good
deal from home, it was not convenient for me to reside with him.
The day after my arrival, he, therefore, advised me to make inquiry
for board and lodging in some regular and decent family, and to
consult him on the eligibility before I made any engagement. I
accordingly began my inquiries, and at length found accommodation
in the family of a tradesman of whom Mr. Dalton approved. Here I
was to be lodged and boarded very comfortably at nine shillings per
week! This charge, to me, who had been accustomed to the
expenses of London, appeared moderate in the extreme: however,
being willing to make the best bargain I could, I informed the good
woman, that as I should receive my salary quarterly from Mr. Dalton,
I could only undertake to pay her at the like period, to which
proposal she therefore readily consented. My motive in this
proceeding was, that in case I quitted Bury before the end of the
first quarter, I might decamp without coming to a settlement, and by
this means have my weekly pay of twenty shillings entire for other
purposes.
Having removed from the inn to my new abode, I was instructed
by Mr. Dalton in the nature of my employment, which was chiefly to
copy or engross deeds in conveyancing, and other similar
documents, peculiar to country practitioners. In a few days I had a
correct idea of what was necessary to be done, and Mr. Dalton
perceiving I required no instruction from him, gave me sole charge
of the office, which was detached from his house, and left it to my
discretion as to the hours or duration of my attendance. This liberty
I did not abuse, but kept every thing in such exact order that I had
soon the pleasure of giving him entire satisfaction.
Mr. Dalton kept a gig, and two blood-horses: as he had a good
deal of public business, relating to county matters, and was one of
the commissioners for the redemption of the land-tax, which
sometimes obliged him to attend meetings at the several market-
towns round about Bury, he often took me with him in his gig,
attended by his servant on horseback. On these occasions there
were usually public dinners at the principal inns, provided at the
expense of the county, or the persons interested. The fare was
always sumptuous, and there was no stint of the best wines. At
other times I was detached on horseback, accompanied by the
servant as a guide, to transact business with different clients, in
various parts of the county. I was not limited in my expenses, and
the account I presented on my return, was freely liquidated by Mr.
Dalton.
Upon the whole, this was one of the most agreeable employments
I ever engaged in, and had I prudently retained it for a few years,
there is no doubt but I should have met with the most liberal
encouragement from my employer. But my natural inconstancy still
prevailed; and I had been but a few weeks at Bury, before I grew
tired of the country, and thought of nothing but returning to London,
with such spoil as I could obtain from the credulity of the tradesmen
in the town. With this view, I bespoke clothes, boots, linen, and
other articles at various shops, informing the parties that I should
expect credit till the expiration of my quarter, to which, on account
of the respectable gentleman I served, they readily consented. As
soon as any of these goods were brought home, I immediately
packed them up in small portable parcels, which I sent up to London
by the coach, consigned to a pawnbroker with whom I was on
intimate terms; desiring him to receive and keep them safe, until he
saw me. I also coached off in the same clandestine manner, such of
my own apparel, &c., as I had in my trunk, in which, to prevent
discovery, I deposited stones or bricks to preserve its gravity. By
these means I had nothing to impede my sudden departure, when
rendered necessary by the arrival of the expected quarter-day.
I must here observe, to meet any surprise the reader might feel
on the subject, that as I had never at this time been connected with
downright thieves, so I had never yet committed an actual theft,
save the embezzlement of money at Liverpool; (which indeed the
law has lately made a felonious taking;) though I therefore scrupled
not at practising a fraud, I was not yet sufficiently depraved to
commit a robbery. This will account for my not robbing the premises
of Mr. Dalton, which at a subsequent period of my life, would have
been my primary object, as I had access to every part of the house,
and have frequently viewed with longing eyes, the servant cleaning
a handsome service of plate in the pantry.
I had now been about two months at Bury, and had no intention
of absconding till the expiration of the third; when an accidental
event induced me to hasten my departure. One afternoon Mr. Dalton
had written several letters in the office, and the footman being
elsewhere engaged, he requested me to drop them in the post-
office, in my way home. I accordingly brought them out in my hand,
and happening inadvertently to cast my eye on the superscriptions, I
perceived that one was addressed to Mr. Lyne, tailor, Cecil-street,
Strand, London. Being curious to know what correspondence Mr.
Dalton could have with a tailor, I opened this letter, and found the
contents to the following effect: “Mr. Lyne,—By the waggon which
goes from hence on Monday next, and arrives at the Blue Boar in
Bishopsgate-street on Wednesday night, I shall send you a
portmanteau corded and sealed, but not locked, containing two
coats, sixteen waistcoats, fourteen pair of breeches, and a suit of
uniform of the city Light Horse[15]. Most of these articles are nearly
as good as new, but as they have now become unfashionable, I
desire you will dispose of them to the best advantage, on my
account, and send me down by the same conveyance, two suits
made in the present taste,” &c.
It immediately struck me, that if I took measures accordingly, I
might arrive in town time enough to intercept and obtain this trunk
from the inn; for which purpose I put this letter in my pocket, and
the others in the post-office. The next day, happening to go into Mr.
Dalton’s kitchen, I there saw the portmanteau corded up, and
directed; and on questioning the servant in a careless manner about
it, he informed me that he was going to carry it to the ⸺ inn, the
following evening, in readiness for the departure of the waggon. The
same afternoon it happened, (which was a most fortunate
circumstance for me,) that Mr. Dalton again begged of me to put
some letters in the post-office, which he had not done above twice
or thrice since I came into his service. Looking at these letters, I saw
to my surprise, another addressed to Mr. Lyne as before, which,
eagerly opening, I found was to mention something Mr. Dalton said
he had forgot in his letter of the preceding day. I immediately
destroyed this second letter, which (had it come to hand) might have
frustrated my design.
I now prepared matters for eloping, and sent off the remainder of
my effects by the coach as before: but my good fortune produced
another windfall of which I had no expectation. The day before my
intended departure, I was walking in the market-place with a young
man, who was clerk to another attorney in the town, and the
conversation turning upon watches, my companion observed that if I
wished to purchase one, he would introduce me to a maker of his
acquaintance, who would use me well on his account. I took him at
his word, and begged he would immediately do so. We were then
within a few doors of the shop, into which we entered; and I
perceived over the window in large characters, “Lumley and
Gudgeon, Watchmakers.” I laughed inwardly at the singularity of the
latter name, which I considered ominous of my success in the
imposition I meant to put upon him. After a short preliminary
conversation, my acquaintance having business to do, took his leave,
and Mr. Gudgeon himself proceeded to shew me several watches. I
informed him that I wished to have a good one, but my
circumstances would not allow me to go to a high price. Mr.
Gudgeon assured me it was better to have a good one at once, and
recommended me a very handsome gilt watch, capped and jewelled,
and his own make, which he said he could warrant to perform well,
and for which he asked me eight guineas. I replied that as my
weekly salary from Mr. Dalton was but one pound, I could not afford
to give so much, and began to examine others of a cheaper kind,
but still letting him see that I had a strong inclination for the one he
had recommended. This induced him to repeat his praises of the
latter, and to press me with greater energy, to fix upon it. I at length
(with a shew of much reluctance) suffered myself to be persuaded;
but I begged leave to observe, that as I was influenced in every
thing by the advice of my good master, Mr. Dalton, I would not
venture to make so expensive a purchase without his approbation;
that if he would therefore intrust me with the watch, I would consult
Mr. Dalton and give him (Mr. Gudgeon,) a decisive answer the next
morning: this he declared himself willing to do, on which I took both
the watch and my leave together, and returned home.
The next morning I attended the office as usual, but of course
took no notice to Mr. Dalton of the affair in hand. During the space
of time I allotted myself for dinner, I again called on Mr. Gudgeon,
and told him that I should keep the watch, provided he would
receive the payment by instalments, as I could not afford to pay the
whole price at once. I therefore proposed to give him the ensuing
Saturday, one or two guineas, as I should find most convenient, and
to pay him half-a-guinea a week afterwards, until the whole was
liquidated. To this he readily agreed, and having fitted a key to the
watch, he begged leave to shew me some chains and seals. Of the
former he had none but gilt ones: I selected one of the neatest, and
a handsome gold seal. I then desired to have a bill of parcels of the
whole, observing that whenever I paid a sum upon account, Mr.
Gudgeon could make a memorandum of it at the bottom by way of
receipt. Having obtained this, I departed, promising to be punctual
in paying my first instalment on the day appointed. This took place
on Tuesday, the portmanteau being now on its way to London; and
the same evening I quitted my lodgings privately, leaving nothing
behind but a trunk, containing brickbats and stones, and walked by
moonlight to a village four miles distant, through which the stage-
coach was to pass the next morning at 7 o’clock. I procured some
supper at a decent public-house, and retired to rest, desiring to be
called in time for the coach. At the expected hour the stage made its
appearance, in which I seated myself, and about eight the same
evening, arrived at the Blue Boar, just two hours after the waggon,
which I perceived standing in the yard.
As soon as I descended from the coach, I walked into the coach-
office, and inquired of the book-keeper, if the Bury waggon was
arrived; he replying that it was, I told him that I expected a trunk,
and on my describing the direction, he looked over the way-bill, and
informed me there was such an article, but the waggon would not
be unladen till the next morning, when I might obtain it by
application. I now retired to the Cross Keys in Gracechurch-street,
where I procured a bed; the next morning, having breakfasted, I
repaired to the Blue Boar, where I had the pleasure of finding the
waggon unloaded; and boldly entering the office, I inquired if I could
have the trunk I had applied for the night before. The clerk
recollecting me, searched for and found it immediately; and placing
it on the counter, demanded a trifling sum for carriage. While I was
joyfully opening my purse to pay this demand, the book-keeper,
seeming to recollect himself, after a short apology, told me it was
not customary with him to deliver goods to a stranger, without he
was shewn a letter or other authority to warrant such delivery, as so
many frauds had been practised upon inn keepers of late. I affected
to be a little displeased at his suspicion, but acknowledging the
justice of such precautions, I assured him I had received a letter of
advice from Bury, but I doubted whether I had it about me, then
pulling out my pocket-book, hastily turned over a number of papers,
and pretending to be a little concerned at my want of thought,
informed the clerk that I had left the letter at home, and must
therefore suffer him to send the trunk to Cecil-street, although it
would occasion an expense for porterage which I intended to have
saved; then repeating my vexation, and carelessly arranging the
pocket-book, I luckily found the identical letter, which I had (as I
pretended) overlooked in my haste. I now drew it forth in triumph,
and obliquely hinting how incapable I was of a fraudulent action was
opening the letter to shew him the contents; but this cautious
person took me aback a second time, by observing that it was
unnecessary to peruse the letter, all that he required was to see the
post-mark! This was a difficulty of which I had not the least idea,
and was therefore unprepared to meet it, and I have often since
wondered that my confusion did not betray me; but I had sufficient
presence of mind to answer with a smile, that I could account for
the absence of a post-mark, by informing him that I received this
letter enclosed in a frank or envelope, which I had destroyed. This
satisfied him, and having read a few lines of the letter, he delivered
the trunk, which I brought away from the inn, and having called a
coach was driven to Aldersgate-street, where I was set down at the
end of a narrow court or passage, leading to West-Smithfield;
through this court I proceeded on foot to prevent my being traced,
as no person could follow me without my perceiving it. Being now
out of danger I took another coach in Smithfield, and was carried to
my friend the pawnbroker’s, to whom I had consigned my effects
from Bury; but on my way, I purchased a handsome large trunk,
capable of containing the whole of my property, including the
contents of Mr. Dalton’s portmanteau. The latter (on arriving at the
pawnbroker’s) I removed into my new trunk, and presented my
friend with the portmanteau; then arranging also the contents of my
various parcels, and paying him for the carriage, &c., I left my trunk
in his care, until I had procured a lodging, which was the next object
I had in view.
I could not help applauding myself on the dexterity with which I
had accomplished this latter adventure, as well as on the general
success of my expedition to Suffolk, on which I had been absent
from London exactly nine weeks. And when it is considered that I
was then but just turned of seventeen years old, the reader must
allow that I displayed a genius and abilities which, had they been
devoted to more honourable purposes, would have done me no
small credit. But I am now writing my “Confessions,” and shall
therefore not attempt to palliate my faults at the expense of my
veracity.
CHAPTER X.
Live gaily for a few weeks on the Spoils of my late Excursion.—Again obliged to
seek Employment.—Engage with a Conveyancer in the Temple.—Apprehended
by my late Master.—Compromise the Affair through the Friendship of a
Relation.

I went immediately in quest of a lodging, and found one to my


mind in Roll’s Buildings, Fetter-Lane; but as this was a respectable
house, the landlady required a reference to character, before she
would admit me as a lodger. I therefore gave her the address of my
friend and relation Mr. Presland, whom I formerly served in Lincoln’s
Inn. That gentleman having satisfied her inquiries, I removed my
baggage from the pawnbroker’s, and took possession of my new
apartment.
The next day I examined the contents of Mr. Dalton’s
portmanteau, and found the whole of the articles to be as he had
described them, nearly new, and all excellent in their kind. As I was
not at this time acquainted with a Fence[16], to whom I could
dispose of this property, I had no other means of turning them into
money, than by pledging them at different pawnbrokers, which I did,
one or two at a time, for as much as I could get, taking out with me
every morning three or four articles in a bundle, so that in a few
days I had obtained money for the whole.
I had now a good stock of clothes of my own, a handsome watch
in my pocket, and some pounds in money, exclusive of the daily
supplies I derived from pledging Mr. Dalton’s apparel: I therefore
began to enjoy myself in the course of life in which I always found
the greatest satisfaction; breakfasting at a coffee-house, dining at a
tavern, and taking my tea in the neighbourhood of the theatres, to
one of which I went almost every night. In the intervals of these
occupations, I amused myself in walking about town, or viewing
public exhibitions, but chiefly in reading books of entertainment and
instruction, to the purchase of which, especially periodical works, I
every day devoted a small sum: so that upon the whole, though I
obtained my money by dishonourable means, yet the manner in
which I spent my life was harmless to myself; nor did I ever, in the
most vicious part of my subsequent career, give myself up to
debauchery or intoxication, the idea of which always disgusted me.
In this manner I lived happily for about five or six weeks, when
finding my ready money nearly exhausted, I judged it expedient to
look out for some employment which might contribute to my
support. I therefore made inquiry among the law offices, and was
referred to Mr. Preston, an eminent conveyancer in King’s Bench
Walk, who engaged me as a transcribing clerk at a guinea a week. I
attended the office from ten till five daily, and spent my evenings in
rational recreation. I must here observe that the office of Mr. Preston
was within two doors of the chambers of Messrs. Dalton and
Edwards, the latter of whom had engaged me for the Bury
expedition; and it was certainly an act of impolicy in me to accept a
situation so immediately contiguous, after the manner in which I had
behaved to Mr. Dalton, as it was highly probable the latter would
write to Mr. Edwards, and desire him to use means for my
apprehension. However this never once struck me, or if it did, I
thought it possible that I might, in a place so constantly thronged
with passengers, go and come unobserved by him a thousand times.
In addition to this, I had never been seen by Mr. Edwards but in that
one interview, which lasted but half an hour; and I had assumed on
that occasion, the name of Smith, whereas I had now resumed my
own. But fate had decreed that I should suffer for my want of
caution, and thus it happened.
In going to and from the office of Mr. Preston, I passed commonly
four times a day by the chambers of Dalton and Edwards, but the
avenue in front of the latter being very extensive, I always contrived
to give them a wide birth, as the sailors term it, and their chambers
being on the first floor, it was not likely that I should be observed,
who was so much below them, and surrounded by numbers of
persons continually passing. It happened, however, that my way to
and from the office, lay through a narrow passage called Mitre
Court, leading into Fleet Street. In this passage I frequently
encountered a young man having the appearance of a lawyer’s clerk,
whose face I thought I was familiar with; and he, on his part, always
looked earnestly at me. As this was by no means uncommon
amongst young men similarly employed, I concluded he had known
me by sight, during my service in a former office, and therefore paid
no attention to the circumstance.
One morning, about nine weeks after my return from Bury, I
entered the office at the usual hour, and I had scarcely taken my
seat at the desk, when Mr. Preston opening the door of his own
apartment, which was immediately adjoining that in which the clerks
wrote, desired me to step into his room, which I should not have
thought extraordinary, had not he at the same moment placed
himself between me and the outer door leading to the street, and
made a motion with his hand for me to walk in first: I had,
therefore, no alternative, but entered the room. Mr. Preston
followed, and, immediately shutting the door, locked it after him;
upon which I turned my head, and saw, to my no small surprise and
confusion, Mr. Dalton himself from Bury St. Edmund’s. That
gentleman advanced towards me, and began to reproach me in
strong terms for my misconduct; then seeing the chain of my watch
hanging out, he immediately drew it from my fob, saying that he
should restore it to the person whom I had defrauded of it. He next
desired to know what I had done with his trunk of clothes: at first I
maintained a sullen silence, and then denied any knowledge of his
meaning: upon which he assured me that he had strong proofs; that
if I did not restore them he would prosecute, and transport me at
the least; but that it was probable I should be hanged for forging a
post-mark to the letter; for that the book-keeper at the Blue Boar
would swear to my person, and that I had shewn him a post-mark
which induced him to deliver the portmanteau. I smiled at the latter
part of this threat, knowing the law too well to be intimidated by it;
but upon Mr. Dalton observing that he knew where I lodged, and
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookfinal.com

You might also like