Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Kerberos 

    authentication using 

    encryption using 

    Heimdal and MIT implementations 

    padding 

    supported ciphers 

key agreement 

key agreement protocols  2nd 

key exchange

    Diffie-Hellman protocol 

        and DSA 

        and forward secrecy 

    securing against rollback attacks 

key schedules 

key transport protocols 

key_len 

key_offset 

keys  [See also cryptography]

    ASCII hexadecimal, conversion to binary 

    authenticated exchange using RSA 

    binary keys, representing as hexadecimal 

    converting text keys to binary keys 

    cryptographic algorithms, representing for usage in 

    exchange keys 

    generating short-term keys from a long-term key 

    length 

        minimum effective 

    length and security 

    management 

    for message queues 

    public keys, binary representation 

    public keys, recommended lengths 

    random symmetric, generating  2nd 

    representation

        as English text 

        in plaintext (PEM encoding) 

        public keys vs. symmetric keys 

    RSA

        decryption using private keys 

        encryption using public keys 

        key pairs, generating 

        signature verification with public keys 

        used in digital signatures 

    secure management 

    session keys, providing forward secrecy while using 

    signed data types and 

    symmetric key-length, choosing 

    third-party validation  2nd 

    variable key sizes, OpenSSL supported 

keystreams 

    parallelizing generation of 

    precomputing in cipher modes or stream ciphers 

Kohno, Tadayoshi 

Kosiur, Dave 

Krawczyk, Pawel 

krb_auth_con_getremotesubkey( ) 

krb5_auth_con_getremotesubkey( ) 

KRB5_GENERAL_ _ preprocessor macro 

krb5_recvauth( ) 

Категории