Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Backdoor

Base Exchange

Base-rate fallacy 2nd

     Bayes' theorem

     conditional probability

     demonstrated

     independence

     problem of

Base64 transfer encoding

Basic constraints

Bastion host

Bayes' theorem

Behavior control

Behavior-blocking software

Bijection

Binary curve

Birthday attacks 2nd

     duplication

     inequality

     mathematical basis of

     overlap between two sets

     paradox 2nd

     related problem

     strategy for

Bit independence criterion (BIC)

Blinding

Block chaining techniques

Block cipher W

     add layer AK

     CState

     diffusion layer MR

     key expansion for

     KState

     nonlinear layer SB

     permutation layer SC

     structure

Block ciphers 2nd 3rd

     cipher block chaining (CBC) mode

     cipher feedback (CFB) mode

     counter (CTR) mode 2nd

     design principles

     electronic codebook (ECB) mode

     ideal

     modes of operation

     motivation for Feistel structure

     output feedback (OFB) mode 2nd

     principles

Block size

Bloom filter

Blum Blum Shub (BBS) generator

Boot sector virus

Brute-force attack 2nd 3rd

     hash functions

     message authentication codes (MAC)

Категории