Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Abelian group 2nd

Access control 2nd 3rd

Active attacks

Add key function, S-AES

Add key layer AK

Addressing schemes, network

AddRoundKey transformation 2nd

Advanced Encryption Standard (AES)

     32bit processor

     8bit processor

     AddRoundKey transformation

     cipher

     evaluation criteria for

     implementation aspects

     importance of

     key expansion

     MixColumns transformations 2nd 3rd

     origins of

     polynomials with coefficients in GF(28)

     Rijndael proposal 2nd

     S-box

     ShiftRows transformation 2nd

     simplified

     structure of

     substitute bytes (SubBytes) transformation 2nd

     transformations 2nd 3rd

Agrawal-Kayal-Saxena (AKS) algorithm

Alert codes, TLS

Alert Protocol

Algorithms 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

     AES key expansion

     Agrawal-Kayal-Saxena (AKS)

     CMAC

     compression

     cryptographic, S/MIME

     Data Authentication

     Data Encryption (DEA) 2nd

     decompression

     decryption 2nd

     deskewing

     Digital Signature (DSA)

     encryption 2nd

     Euclidean

     Feistel

     HMAC

     key schedule

     Miller-Rabin

     RC4

     Rivest-Shamir-Adleman (RSA) 2nd

     Secure Hash (SHA)

     subkey generation

     Whirlpool

Analysis, ease of

ANSI X.9.17 PRNG

Anti-Replay, IPSec 2nd

Antivirus software

Applicability statement (AS)

Application-level gateway

Arbitrated digital signature

Arithmetic 2nd 3rd 4th [See also Number theory]

     elliptic curve

     modular 2nd

     polynomial

Attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Malicious software, Viruses, Worms]

     active

     birthday attacks 2nd

     brute-force 2nd 3rd

     chosen ciphertext attack (CCA)

     confidentiality, locations for

     cryptanalytic 2nd

     differential cryptanalysis

     distributed denial of service (DDoS)

     identification of

     known-plaintext

     man-in-the-middle 2nd

     meet-in-the-middle 2nd

     passive

     replay

     security 2nd 3rd

     suppress-replay

     timing attacks

Audit records

Authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     algorithm, IPSec

     applications of

     birthday attacks 2nd

     codes

     Data Authentication Algorithm

     data origin

     functions

     hash functions 2nd 3rd 4th 5th

     header (AH) 2nd 3rd 4th

     Kerberos 2nd

     message authentication code (MAC) 2nd 3rd 4th

     message encryption 2nd

     mutual

     network security services

     Oakley key determination protocol

     one-way 2nd

     peer entity

     Pretty Good Privacy (PGP) 2nd

     protocols

     public-key encryption approaches 2nd

     public-key infrastructure (PKI)

     requirements

     secret key

     security of hash functions and MACs

     symmetric encryption approaches 2nd

     three-way

     two-way

     X.509

Authentication dialogue 2nd 3rd 4th

     authentication service exchange

     Kerberos version 4 2nd 3rd

     Kerberos version 5

     simple

     ticket-granting server (TGS) 2nd 3rd

Authentication Header (AH) 2nd 3rd 4th

     Anti-Replay service

     defined

     fields

     information

     Integrity Check Value (ICV)

     IPv6

     transport mode

     tunnel mode

Authentication Only Exchange 2nd

Authority key identifier

Availability service

Avalanche effect

Категории