Secrets and Lies 15th Anniversary Edition Bruce Schneier - Own The Ebook Now and Start Reading Instantly
Secrets and Lies 15th Anniversary Edition Bruce Schneier - Own The Ebook Now and Start Reading Instantly
com
[Link]
anniversary-edition-bruce-schneier/
OR CLICK HERE
DOWLOAD EBOOK
[Link]
the-age-of-aids-1st-edition-robert-klitzman/
[Link]
battles-to-collect-your-data-and-control-your-world-1st-edition-
bruce-schneier/
[Link]
you-15th-anniversary-study-edition-james-g-friesen/
[Link]
importance-of-getting-it-right-and-practicing-morality-with-
others-1st-edition-cheshire-calhoun/
Design Methods and Practices For Research of Project
Management Second Edition Beverly Pasian & Rodney
Turner
[Link]
research-of-project-management-second-edition-beverly-pasian-
rodney-turner/
[Link]
management-3rd-edition-william-e-hammitt/
[Link]
and-disciplinarity-1st-edition-gilbert-weiss/
[Link]
newton/
[Link]
and-scientists-3rd-ed-edition-hopgood/
Information Technology Project Management Providing
Measurable Organizational Value Jack T. Marchewka
[Link]
management-providing-measurable-organizational-value-jack-t-
marchewka/
Praise for Secrets and Lies
“Bruce shows that concern for security should not rest in the IT
department alone, but also in the business office . . . Secrets and Lies is the
breakthrough text we’ve been waiting for to tell both sides of the story.”
–Steve Hunt, Vice President of Research, Giga Information Group
“All in all, as a broad and readable security guide, Secrets and Lies should
be near the top of the IT required-reading list.”
–eWeek
“Secrets and Lies should begin to dispel the fog of deception and special
pleading around security, and it’s fun.”
–New Scientist
“This book should be, and can be, read by any business executive, no
specialty in security required . . . At Walker Digital, we spent millions of
dollars to understand what Bruce Schneier has deftly explained here.”
–Jay S. Walker, Founder of [Link]
“Just as Applied Cryptography was the bible for cryptographers in the 90’s,
so Secrets and Lies will be the official bible for INFOSEC in the new mil-
lennium. I didn’t think it was possible that a book on business security
could make me laugh and smile, but Schneier has made this subject very
enjoyable.”
–Jim Wallner, National Security Agency
“The news media offer examples of our chronic computer security woes
on a near-daily basis, but until now there hasn’t been a clear, compre-
hensive guide that puts the wide range of digital threats in context. The
ultimate knowledgeable insider, Schneier not only provides definitions,
explanations, stories, and strategies, but a measure of hope that we can
get through it all.”
–Steven Levy, author of Hackers and Crypto
“In his newest book, Secrets and Lies: Digital Security in a Networked World,
Schneier emphasizes the limitations of technology and offers managed
security monitoring as the solution of the future.”
–Forbes Magazine
Secrets and Lies
Digital Security
in a Networked World
Bruce Schneier
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
Published by
John Wiley & Sons, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
[Link]
ISBN: 9781119092438
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except
as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either
the prior written permission of the Publisher, or authorization through payment of the appropriate
per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,
(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed
to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
(201) 748-6011, fax (201) 748-6008, or online at [Link]
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations
or warranties with respect to the accuracy or completeness of the contents of this work and specifically
disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No
warranty may be created or extended by sales or promotional materials. The advice and strategies
contained herein may not be suitable for every situation. This work is sold with the understanding that
the publisher is not engaged in rendering legal, accounting, or other professional services. If professional
assistance is required, the services of a competent professional person should be sought. Neither the
publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or
Web site is referred to in this work as a citation and/or a potential source of further information does
not mean that the author or the publisher endorses the information the organization or website may
provide or recommendations it may make. Further, readers should be aware that Internet websites listed
in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services please contact our Customer Care
Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993
or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material
included with standard print versions of this book may not be included in e-books or in print-on-
demand. If this book refers to media such as a CD or DVD that is not included in the version you
purchased, you may download this material at [Link] For more information
about Wiley products, visit [Link].
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley &
Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without
written permission. [Insert third-party trademark information] All other trademarks are the property
of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor
mentioned in this book
To Karen: DMASC
Contents
Foreword to 2015
15th Anniversary Edition ix
preface xxiii
1. introduction 1
3. attacks 23
4. adversaries 42
5. security needs 59
Part 2: technologies 83
6. cryptography 85
8. computer security 120
vii
viii Contents
9. identification and authentication 135
Part 3: strategies 271
21. attack trees 318
25. conclusion 389
afterword 396
resources 399
Acknowledgments 401
index 403
Foreword to 2015
15th Anniversary Edition
ix
x Foreword to 2015 15th Anniversary Edition
toring and analysis tools. There are systems that detect when critical files are
accessed or changed. And Managed Security Monitoring is a fully mature
part of the IT security industry. (BT acquired Counterpane in 2006.)
I bring this up because there’s a parallel to today, in both my own
thinking and in Internet security. If the 1990s were the decade of pro-
tection, and the 2000s became the decade of detection, the 2010s are the
decade of response. The coming years are when IT incident response
products and services will fully mature as a product category.
Again, on the surface it seems obvious. What good is an alarm system
if no one responds to it? But my 2000 writings in this book barely flesh
that idea out, and even in the years after, most of us talked about incident
response in only the most general terms. (See Chapter 24 for an example.)
The FIRST conference for IT response professionals has been around
since 1988, but it’s long been a sidelight to the rest of IT security. It’s only
recently that it has become incorporated into the industry. Again I am in
a company that is at the forefront of this: building an incident response
management platform. But this time I am not alone; there are other com-
panies building products and services around IT incident response.
This is a good thing. If there’s anything we’ve learned about IT
security in recent years, it’s that successful attacks are inevitable. There
are a bunch of reasons why this is true, but the most important is what
I wrote about in Chapter 23: complexity. Complex systems are inher-
ently more vulnerable than simple ones, and the Internet is the most
complex machine mankind has ever built. It’s simply easier to attack our
modern computer systems than it is to defend them, and this is likely to
remain true for the foreseeable future. It’s not that defense is futile, it’s
that attack has the upper hand.
This means that we have to stop believing that we can be resistant
against attacks, and start thinking about how we can be resilient in the
face of attacks. Resilience comes from a combination of elements: fault-
tolerance, redundancy, adaptability, mitigation, and survivability. And a
big part of it is incident response. Too many of the high-profile security
incidents over the past few years have been followed by ham-handed
responses by the victims, both technically and organizationally. We all
know that response is important, yet we largely approach it in an ad hoc
manner. We simply have to get better at it.
The best way I’ve found to think about incident response is through
a military concept called OODA loops. OODA stands for “observe,
Foreword to 2015 15th Anniversary Edition xi
orient, decide, act,” and it’s a way of thinking about real-time adver-
sarial situations. The concepts were developed by U.S. Air Force mili-
tary strategist Colonel John Boyd as a way of thinking about fighter-jet
dogfights, but the general idea has been applied to everything from busi-
ness negotiations to litigation to strategic military planning to boxing—
and computer and network incident response.
The basic idea is that a fighter pilot is constantly going through
OODA loops in his head. And the faster he can perform these loops—if,
in Boyd’s terminology, he can get inside his opponent’s OODA loop—
he has an enormous advantage. Boyd looked at everything on an aircraft
in terms of how it improved one or more aspects of the pilot’s OODA
loop. And if it didn’t improve his OODA loop, what was it doing on
the aircraft?
More generally, people in any of these real-time adversarial situa-
tions need tools to improve the speed and effectiveness of their OODA
loops. In IT, we need tools to facilitate all four OODA-loop steps.
Pulling tools for observation, orientation, decision, and action together
under a unified framework will make incident response work. And mak-
ing incident response work is the ultimate key to making security work.
The goal here is to bring people, process, and technology together in a
way we haven’t seen before in network security. It’s something we need
to do to continue to defend against the threats.
This is what’s missing from Secrets & Lies, and this is what I am
trying to do today. My company, Resilient Systems, Inc., has built a
coordination platform for incident response. The idea is that when an
incident occurs, people need to immediately convene and figure out
what’s happening, what to do, and how to do it. Any coordination
system has to be flexible in every possible dimension. You won’t know
beforehand who has to be involved in an incident response. You won’t
know beforehand what has to be done, and who has to do it. You won’t
know what information you will need, and what information you will
need to disseminate. In short, you have to be ready for anything.
Protection, detection, and response are not unique to computers
and networks, or even to technology. When I look at all the threats in
a hyper-complex, hyper-technological, hyper-connected world, I rec-
ognize that we simply can’t predict the threat. Our only chance for
real security is to be resilient in the face of unknown and unknowable
threats. I’m working in IT and information resilience. We need political
xii Foreword to 2015 15th Anniversary Edition
resilience, social resilience, economic resilience, and lots more besides.
This is what I am thinking about now—how to be resilient in the face
of catastrophic risks—and something I hope to be my next book.
Since writing Secrets & Lies in the late 1990s, I have learned a lot
about security from domains outside of IT. I have also tried to bring
some of the best security ideas from IT into more general security
domains. Today, many of us are doing that. This book still has a lot to
teach people, both within IT and without. But the rest of the world has
a lot to teach us in IT security; OODA loops are just one example. Our
goal should be to always keep learning from each other.
I t’s been over three years since the first edition of Secrets and Lies was
published. Reading through it again after all this time, the most
amazing thing is how little things have changed. Today, two years
after 9/11 and in the middle of the worst spate of computer worms and
viruses the world has ever seen, the book is just as relevant as it was when
I wrote it.
The attackers and attacks are the same. The targets and the risks are
the same. The security tools to defend ourselves are the same, and they’re
just as ineffective as they were three years ago. If anything, the problems
have gotten worse. It’s the hacking tools that are more effective and
more efficient. It’s the ever-more-virulent worms and viruses that are
infecting more computers faster. Fraud is more common. Identity theft
is an epidemic. Wholesale information theft—of credit card numbers and
worse—is happening more often. Financial losses are on the rise. The
only good news is that cyberterrorism, the post-9/11 bugaboo that’s scar-
ing far too many people, is no closer to reality than it was three years ago.
The reasons haven’t changed. In Chapter 23, I discuss the problems
of complexity. Simply put, complexity is the worst enemy of security.
As systems get more complex, they necessarily get less secure. Today’s
computer and network systems are far more complex than they were
when I wrote the first edition of this book, and they’ll be more complex
still in another three years. This means that today’s computers and
networks are less secure than they were earlier, and they will be even less
xiii
xiv Introduction from the Paperback Edition
secure in the future. Security technologies and products may be
improving, but they’re not improving quickly enough. We’re forced to
run the Red Queen’s race, where it takes all the running you can do just
to stay in one place.
As a result, today computer security is at a crossroads. It’s failing,
regularly, and with increasingly serious results. CEOs are starting to
notice. When they finally get fed up, they’ll demand improvements.
(Either that or they’ll abandon the Internet, but I don’t believe that is a
likely possibility.) And they’ll get the improvements they demand; cor-
porate America can be an enormously powerful motivator once it gets
going.
For this reason, I believe computer security will improve eventually.
I don’t think the improvements will come in the short term, and I think
they will be met with considerable resistance. This is because the engine
of improvement will be fueled by corporate boardrooms and not com-
puter-science laboratories, and as such won’t have anything to do with
technology. Real security improvement will only come through liability:
holding software manufacturers accountable for the security and, more
generally, the quality of their products. This is an enormous change,
and one the computer industry is not going to accept without a fight.
But I’m getting ahead of myself here. Let me explain why I think the
concept of liability can solve the problem.
It’s clear to me that computer security is not a problem that technol-
ogy can solve. Security solutions have a technological component, but
security is fundamentally a people problem. Businesses approach security
as they do any other business uncertainty: in terms of risk management.
Organizations optimize their activities to minimize their cost–risk prod-
uct, and understanding those motivations is key to understanding com-
puter security today. It makes no sense to spend more on security than
the original cost of the problem, just as it makes no sense to pay liability
compensation for damage done when spending money on security is
cheaper. Businesses look for financial sweet spots—adequate security for
a reasonable cost, for example—and if a security solution doesn’t make
business sense, a company won’t do it.
This way of thinking about security explains some otherwise puzzling
security realities. For example, historically most organizations haven’t
spent a lot of money on network security. Why? Because the costs have
Another Random Document on
Scribd Without Any Related Topics
Fig. 172.—Moresque Counterchange
pattern, inlaid marble.
Many plants are used as symbols in Christian art: the vine, as typical of
Christ, during Byzantine times and the Middle Ages. In Scripture we find
frequent allusions to the vine and grapes; the wine-press is typical of the
“Passion,” as we read in Isaiah. The passion-flower, as its name denotes,
was, and is, used as an emblem of the death of Christ. The lily is the
emblem of purity, and has always been used as the attribute of the Virgin
Mary in pictures of the Annunciation. We find this plant often engraved on
the tombs of early Christian virgins. From the iris, formerly called a lily, is
derived the flower de luce, or fleur-de-lis, one of the finest conventional
renderings of any flower; it was much used as a decoration in sculpture,
painting, and weaving during the thirteenth and following centuries. It was
the royal insignia of France; mediæval Florence bore it on her shield and on
her coin, the fiorino; and it was used in the crowns of many sovereigns,
from King Solomon down to our own Queen. The trefoil is an emblem of
the Trinity, and is a common form in Gothic decoration.
Figs. 173 and 174.—Interchange
ornament.
The symbolic and mnemonic classes have now been described, and the
æsthetic alone remains. Æsthetic form we owe to the clearness and
directness of the Greek mind. The Greeks were contented with the simple
solution of the problem before them, which was to beautify what they had
in hand. If they wanted allegorical subjects they confined them to their
figure subjects, and being thus freed from other disturbing elements, they
concentrated their whole attention on perfecting floral form. They attained
perfection in this as they did in their figures, by correcting the peculiarities
of the individual by a study of the best specimens of a whole class; and thus
succeeded in making the most perfect type of radiating ornament, and of
adapting it to sculpture and painting, on flat and curved surfaces. This
ornament has perfect fitness, for you can neither add to it nor take away
from it without spoiling its perfection. The same may be said, only in a
minor degree, of the colour applied to the carved patterns of the Saracens
and Moors: they are both æsthetic works, solely created for their beauty. A
symphony in music is a composition of harmonious sounds; it has little
subject-matter, and is analogous to æsthetic ornament, only the ear is
charmed by the former, as the eye is by the latter.
APPENDIX
undersides of the mutules were copied from the slanting timbers of the roof.
I will speak first of the Greek orders, not only because they were the
earliest, but because the Greeks showed the greatest artistic sensibility in
their choice of forms, in the composition of lines, and in their arrangements
for light and shade. I begin with the Doric. The shaft is conical, and fluted
with twenty shallow segmental flutes that finished under the capital, which
consists of a thick square cap called the abacus, with a circular echinus
under it, finished at the bottom with rings called annulets, and a little below
them is a deep narrow sunk chase called the necking, and the shaft has no
base.
The Greeks were a seafaring people, mainly inhabiting the sea-shore, the
islands of the Archipelago, and the edges of Asia Minor, and were thus
acquainted with the forms of the sea and of shells. The echinus of the Doric
capital resembles the shell of the sea-urchin, or echinus, when it has lost its
spines, and was probably called after it. The ovolo moulding that was most
used was called the cyma or wave. At the Parthenon, the finest example of
the Doric, the architrave is plain, and was once adorned with golden shields
and inscriptions; it is capped by a square moulding called the tænia or band;
the frieze, with its square cymatium, is capped with a carved astragal, and is
divided longitudinally by the triglyphs, projecting pieces, ornamented with
two whole and two half vertical channels, from which the word triglyph
takes its name; below the tænia is a narrower square moulding the width of
the triglyph, and beneath it, ornamented with drops called guttæ. I may
point to this as a most artistic device both to relieve the monotony of the
tænia and to weld the architrave with the frieze. The triglyphs begin at the
angles of the frieze, and range centrally over all the rest of the columns,
with an additional triglyph between each, though in the frieze over the
larger central opening of the Propylæum there are two intermediate
triglyphs; the nearly-square metopes between the triglyphs are filled with
figure-sculpture. The cornice consists of the square mutule band, from
which the mutules project, whose slanting underside is enriched with drops;
and above the mutules is their capping, a narrow fascia under the corona;
the corona or main projecting member of the cornice is throated at the
bottom, and its capping consists of a wide fillet, deeply-throated, with a
hawk’s-bill moulding under it. These together form the most superb piece of
architectural work that exists, and has called forth the rapturous admiration
of all the tasteful in the world, from the time it was built to the time of
Ernest Renan, one of its latest distinguished admirers.
I have lingered over this order because it is a masterpiece for all time.
Those who have seen it in England alone are possibly convinced that this
praise has been ill-bestowed; yet even these would change their opinion if
they saw it when perfectly white on a clear day in bright sunshine; but in
London, even at its best, the clear air and fierce sun of Athens is wanting, as
well as the pentelic marble, and the chances are that the sculpture in the
metopes has been left out. This Doric of the Greeks is true architecture,
fitted to the climate, and made by men of genius to charm the most gifted
race the world has seen. To the Greek architect no thought and no labour
was too great in designing his building, to form it so that the sun would play
melodies on it from dawn to dusk. Such truly national architecture cannot
be imported into a different climate without losing most of its effect, nor
can it be transferred to a coarse and opaque material without losing much of
its charm; while its sculpture, the finest the world has yet seen, portrayed
national traditions or events connected with its faith. But even here in
London, if you see paraphrases of Greek architecture just painted white on a
clear sunshiny day, you will see a faint reflex of its pristine glory. The rising
moon that the sun makes on the echinus, contrasted with soft graduated
warm shades and sharp blue shadows, is the finest thing an architect has
ever compassed. The splendid sculpture that adorned its metopes may be
seen in the Elgin room of the British Museum. This one example is a model
for those who seek perfection in exquisite simplicity, for almost all the
mouldings are square ones, and there is no enrichment beyond the highest
figure-sculpture, and one little carved astragal; and I may add, that the
perfection of the whole composition of the Temple is as great as that of this
part.
The Ionic.
The example, given on account of its simplicity, is from the Temple on
the river Ilissus. The column differs from that of the Doric by being of
slenderer proportions, by having twenty-four deep elliptical flutes with
fillets in its shaft, by having a cushioned capital inserted between the thin
moulded
Fig. 176.—Entablature, capital and base of the Greek Ionic Temple on the
Ilissus.
abacus, and a shallow echinus carved with the egg and tongue. The
peculiarity of this cushioned cap is, that each side of the front and back
faces are formed into volutes, and come down considerably below the
bottom of the capital, and are carved on the faces with a shell spiral.[10] The
junctions of the plain surfaces of the volutes with the projecting circular
echinus are masked by a half honeysuckle. At the bottom of the shaft is a
circular pedestal or base of slight projection, consisting of an upper and
lower torus joined by a hollow (trochilus), the upper torus being
horizontally fluted and the lower one plain, and there is no square plinth.
In this case the architrave is deep and without fascias, though the Ionic
order has mostly three fascias; its capping (cymatium) consists of a fillet
with a plain cyma and astragal beneath. The frieze, which has no triglyphs,
is supposed to have been sculptured with figures; its cymatium consists of
an ogee and astragal, to admit which the underside of the corona is deeply
hollowed out; the cymatium of the corona consists of a narrow fillet and a
cyma. The crowning member probably only existed on the raking sides of
the pediment.
As this is not a treatise for architects, but a sketch of the subject for
ornamentalists, one example is enough to show the difference between the
Doric and Ionic, but the capital of the most ornate example, that of the
Erechtheum, is given; its main differences from the former one being these,
that the ornaments on the mouldings are carved instead of only being
painted, that in the entablature there are three fascias to the architrave, that
the column has a neck carved with floral ornaments and a carved necking,
and the sweeps of the capital as well as the spirals of the volutes are more
numerous.
Fig. 177.—Side elevation, plan, and section of the Ionic capital, from
the Temple on the Ilissus.
Section. Section.
Fig. 178.—Greek Ionic: half of the Capitol from the north portico of the
Erechtheum at Athens. A is a regular guilloche with coloured glass beads in
the eyes.
I have given too the capital of the internal Ionic columns of Apollo
Epicurius at Bassæ, to show how much it is improved by making the top of
the capital curved instead of straight. The Ionic is more graceful and as a
rule more ornate than the Doric, but is not so majestic. Capitals from the
Fig. 179.—Capital from the Temple of Apollo Epicurius at Bassæ.
Greek Ionic.
Erechtheum, from the Temple at Bassæ, from the last Temple of Diana at
Ephesus, and from the Mausoleum are at the British Museum.
The Corinthian.
Callimachus, according to Vitruvius, invented this capital, and is
supposed to have lived about 396 B.C., forty years before Alexander the
Great was born. Besides the beauty of this order of the choragic monument
of Lysikrates, it is the only undoubted and complete Greek specimen that
we have in Europe. The main importance of the invention, besides its
intrinsic beauty, is its being adopted by the Romans as their favourite order
and used throughout their dominions. I give you here the story Vitruvius
tells of its invention. Besides the prettiness of the story, it serves as an
incitement to the reflection, that if those whose hand and eye are trained
will only observe what they see, they may get notions for inventions.
“A marriageable maid, a citizen of Corinth, was taken ill and died. After
her burial, her nurse gathered the things in which the maid most delighted
when she was alive, put them into a basket, and carried them to the grave
and put them on the top, and so that they might last the longer in the open
air, covered them with a tile. By chance this basket was put on an acanthus
root. The acanthus root meanwhile, pressed by the weight, put forth its
leaves and shoots about spring time; these shoots growing against the sides
of the basket, were forced to bend their tops by the weight of the corners of
the tile and to make themselves into volutes. Then Callimachus, who from
the elegance and subtlety of his sculpture was called Catatechnos by the
Athenians, passing by that grave, noticed the basket and the tender growth
of leaves round it, and charmed by the style and novelty of its form, made
his columns among the Corinthians after that pattern.” (Vit. lib. 4, cap. i. pp.
9, 10.)
Fig. 180.—Entablature, capital and base of
the Lysikrates monument. Greek Corinthian.
at the centre, but turning the reverse way to those beneath; from the middle
of these springs a honeysuckle, whose top is as high as the top of the
abacus, and there is a little floral sprig between the angle volutes and the
honeysuckle, to relieve the bareness of the basket or bell. The foliage of this
capital is exquisitely graceful, but the outline of the capital is not happy.
The entablature is Ionic, to leave the frieze clear for the sculptured history
of Bacchus, turning some pirates into dolphins. The architrave is deep with
three equal fascias, the face of each one inclined inwards, and a cymatium.
Above the cymatium of the frieze is a cornice with a heavy dentilled bed
mould.
The Greeks were consummate artists, who bore in mind the adage that
“rules are good for those who can do without them,” and adapted every part
of their buildings to produce the effect of light and shade they wanted. The
profiles of their mouldings were mostly slightly different in every example
we have, and mostly approximate to conic sections, so as to have the shade
less uniform, segments of circles being rarely used; and there was in Athens
an affluence of excellent figure sculptors.
It has always seemed to me that the slight variations the Greeks made in
their profiles to get perfection, and their passion for simplicity, were greatly
due to their intimate knowledge of the nude human figure. All their recruits
were exercised naked, and they must have noticed that the perfecting of the
human shape by training was brought about by slight variations.
The Roman Orders.
The Romans, great people as they were in subjugating, governing, and
civilizing so great a portion of the world, and possibly on that very account,
were
Fig. 182.—The Tuscan order.
not artistic in the sense that the Greeks were. The Romans were slaves to
easy rules and methods; most, if not all, the profiles of their mouldings were
struck with compasses, and they were almost destitute of good figure
sculptors. They had, however, a passion for magnificence, and for ornate
stateliness and dignity, and they rarely failed to get these in their public
monuments.
Besides the three orders which were taken from the debased Greek
examples of their own time, the Romans added two, the order of the
Tuscans, and an invention of their own called the Composite.
The Tuscan.
The Tuscan is described by Vitruvius, lib. 4, cap. 7, as an incomplete
Doric, but with a base and a round plinth. The portico of St. Paul’s, Covent
Garden, by Inigo Jones, is the best example we have of it in London. The
example given is from the learned Newton Vitruvius.
shallower than in the Greek examples. In the frieze the triglyphs are over
the centres of the angle columns; the guttæ are the frustums of cones, while
those of the Greeks were cylinders or with hollowed sides; the cornice has a
dentilled bed mould; and the mutules have disappeared, but their edge runs
through and the soffit is slanting, and ornamented alternately with coffers
and small guttæ, six on face and three deep; and besides, the cymatium of
the corona is capped by a large cavetto; this in the Greek examples was only
the crowning member of the slanting sides of the pediment. There are
Roman Doric columns at the Colosseum, at Diocletian’s Baths at Rome,
and elsewhere. The Doric, best known to us, was elaborated by the Italian
architects of the Renaissance.
extra crowning member, and the floral ornaments on some of the mouldings
are gigantic. Its main importance to us is from the use made of it by the
Renaissance architects, some of whom, however, greatly improved its
appearance, by making it a four-faced capital, by adding a necking and
putting festoons from the eyes, thus giving the capital greater depth and
importance.
The Roman Corinthian.
The magnificence of this capital took the Romans, so that good
examples of the other orders, except of the Composite, are rare. As I said
before, the only undoubted Greek Corinthian order that has come down to
us is that of the Lysikrates monument, though we have many Greco-Roman
examples. The best Roman example I can give you is that of the Pantheon;
the existing portico is believed by M. Chedanne to be a copy of Agrippa’s,
made in the days of Septimius Severus. At any rate, it has the comparative
simplicity that characterized some of the buildings just before our era. The
capital has two rows of eight leaves, the upper row not rising to quite so
great a height above the lower ones as these do above the necking, and there
is space between the upper leaves to show the stalks of the sheaths of the
cauliculi; the inner ones finish under the rim of the basket, the outer ones
form the volutes under the angles of the abacus, and above these a curled
leaf masks the overhanging of the angles of the abacus. From some foliage
on the top of the upper
Fig. 186.—Roman Corinthian. Entablature of Jupiter Tonans.
middle leaf, a stalk runs up behind the cauliculi, and blossoms in the
abacus.
It may be observed that the cauliculi of the centre and of the volute have
lost the floral character and become stony. The shafts are unfluted, being of
granite, and have the favourite Roman base, a plain upper and a lower torus,
with two scotias separated by double astragals and fillets. The entablature
consists of an architrave of three fascias, the bottom edge of whose
projections are moulded, the whole architrave is capped with a cymatium
consisting of a wide fillet and an ogee with an astragal beneath. The frieze
is slightly shallower than the architrave, and has nothing on it but the
inscription, and its cymatium is the counterpart of that of the architrave on a
smaller scale. The cornice is heavy, and its bed mould consists of an uncut
dentil band, an ovolo carved with the egg and tongue, and an astragal
carved with the bead and reel, a modilion band with carved modilions, a
shallow corona, and a deep cyma-recta-cymatium with fillets.
I have added the fine and gigantic capital of Mars Ultor and the
entablature of Jupiter Tonans, which is overladen with ornament, as a
contrast to the almost stern simplicity of that of the Pantheon.
I shall only draw your attention to two points in this ornamentation, the
omission of the tongues between the eggs, leaving only the upright line, and
the attempt to turn the egg and tongue into a foliated form. The egg itself is
covered with ornament, and is set in the centre of acanthus leaves. We must
praise the boldness of the author, who has given us a new ornament, but
deplore his want of tasteful invention which has forced him to give a bad
one.
The varieties of leaves used in capitals have been mentioned in the body
of the book.
saw that in tall columns, and in this case the columns are on pedestals, the
volutes of Corinthian columns
Fig. 188.—Roman composite capital from the Arch of Titus.
were too insignificant. This capital when once invented took the Romans,
and was applied everywhere.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
[Link]