Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Caesar cipher

Canonical form, MIME

Cardholder account authentication, SET

Certificate management messages (CMC)

Certificate management protocols (CMP)

Certificate Request (CR) payload 2nd

Certificate revocation list (CRL)

Certificate_verify message 2nd

Certificates 2nd 3rd 4th 5th 6th 7th 8th

     elements of

     forward

     messages 2nd

     obtaining

     payload 2nd

     policies

     processing

     reverse

     revocation of

     TLS client types

     user

Certificates-only message

Certification authority (CA)

Certification path constraints

Certification, PKIX

Challenge/response

Change Cipher Spec Protocol

Character marking

Chinese remainder theorem (CRT) 2nd

Chosen ciphertext attack (CCA)

Cipher 2nd 3rd 4th [See also Block Ciphers, Symmetric ciphers]

     block

     Caesar

     Feistel

     Hill

     monoalphabetic

     one-time pad

     Playfair

     polyalphabetic

     stream

     transposition

     Vigenère

Cipher block chaining (CBC) mode 2nd

Cipher feedback (CFB) mode

Cipher suites, TLS

Cipher-based message authentication code (CMAC)

Ciphertext 2nd 3rd

Circuit-level gateway

Clandestine error

Class

Clear-signed data 2nd

Client certificate types, TLS

CMAC [See Cipher-based message authentication code (CMAC)]

Coefficient set

Common Criteria (CC)

     protection profiles (PPs)

     requirements

     security targets (STs)

     target of evaluation (TOE)

Commutative ring

Component

Compression 2nd 3rd

     algorithm

     function

     PGP

Computation resistance

Computer Emergency Response Team (CERT)

Computer security

Conditional probability

Confidentiality 2nd 3rd 4th

     attacks, locations for

     encryption function, placement of

     importance of

     key distribution

     local area networks (LANs)

     Pretty Good Privacy (PGP)

     random number generation 2nd

     SET

     SSL

     traffic

Confusion

Congruences, properties of

Congruent modulo (n)

Connection, SSL 2nd

Constant exponentiation time

Constant polynomial

Constraints, X.509 certification

Content modification

Cookie exchange

Counter (CTR) mode 2nd

Covert channel

CRL issuer

Cross certification

CRT [See Chinese remainder theorem (CRT)]

Cryptanalysis 2nd 3rd 4th 5th 6th

     differential

     hash functions

     linear

     message authentication codes (MAC)

     public-key

     types of attacks

Cryptanalytic attack

Cryptographic computations 2nd

     master secret creation

     padding

     parameters, generation of

     SSL

     TSL

Cryptographically generated random numbers

Cryptographically secure pseudorandom bit generator (CSPRBG)

Cryptography 2nd 3rd 4th

     projects for teaching

     public-key

     system dimensions

Cryptology

Cryptosystems

     applications for

     cryptanalysis

     principles of

     public-key

     requirements for

CState

Curves [See Elliptic curve arithmetic, Elliptic curve cryptography]

Cyclic encryption

Cyclic group

Категории