Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Data 2nd 3rd 4th 5th

     access control

     compression using ZIP

     confidentiality

     integrity 2nd

     origin authentication

     sensitivity level

Data Encryption Algorithm (DEA) 2nd

Data Encryption Standard (DES) 2nd 3rd 4th 5th

     56bit keys, use of

     algorithm, nature of

     avalanche effect

     Data Authentication Algorithm

     decryption

     design criteria

     differential cryptanalysis

     double

     encryption

     importance of

     key generation 2nd

     known-plaintext attack

     linear cryptanalysis

     meet-in-the-middle attack

     message authentication code (MAC)

     multiple encryption 2nd

     permutation, initial 2nd

     reduction to single stage

     single round, details of

     strength of

     timing attacks

     triple

     use of 2nd

DDoS [See Distributed denial of service (DDoS) attacks]

Decentralized key control 2nd

Decompression algorithm

Decryption 2nd 3rd 4th 5th 6th 7th 8th

     algorithm 2nd

     DES

     elliptic curves

     Feistel algorithm

     S-AES 2nd

Delete (D) payload 2nd

Denial of service

Design 2nd 3rd

     block cipher principles

     DES criteria

     firewalls

     function F

     HMAC

     key schedule algorithm

     rounds, number of

     S-Box

Deskewing algorithms

Destination IP Address 2nd 3rd

Destination Options header 2nd

Destination repudiation

Differential cryptanalysis

Diffie-Hellman key exchange 2nd 3rd

     algorithm

     analog of

     anonymous

     ephemeral

     fixed

     man-in-the-middle attack

     protocols

     SSL

     use of

Diffusion 2nd

     layer MR

     method of

Digital immune system

Digital signatures 2nd

     algorithm (DSA)

     arbitrated

     authentication protocols

     direct

     Oakley key determination protocol

     requirements

     standard (DSS)

Direct DDoS

Direct digital signature

Direction control

Disclosure

Discrete logarithms

     calculation of

     modular arithmetic

     modulo n

     powers of an integer

     use of

Distributed denial of service (DDoS) attacks

     constructing

     consumes data transmission resources

     countermeasures

     direct

     internal resource

     reflector

     scanning strategies

Distributed intrusion detection

Divisors

Domain of Interpretation (DOI)

DS/ESN 2nd

Dual signature, SET

Категории