Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

E-mail virus

Electronic codebook (ECB) mode

Electronic data interchange (EDI)

Electronic mail (e-mail) security

     data compression

     e-mail compatibility

     Pretty Good Privacy (PGP) 2nd 3rd

     radix-64 conversion

     random number generation using PGP

     Secure/Multipurpose Internet Mail Extension (S/MIME)

     ZIP, data compression using

Elliptic curve arithmetic

     Abelian groups

     algebraic description of addition

     binary curve

     curves over GF(2m)

     curves over Zp

     geometric description of addition

     prime curve

     real numbers

Elliptic curve cryptography (ECC)

     Diffie-Hellman key exchange

     encryption/decryption

     security of

Encapsulating Security Payload (ESP) 2nd 3rd 4th

     algorithms, encryption and authentication

     authentication option

     format

     Information

     padding

     transport mode 2nd

     tunnel mode 2nd 3rd

Encapsulating Security Payload header

Encrypt-decrypt-encrypt (EDE) sequence

Encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th [See also Block cipher, Data Encryption Standard (DES), Public-key encryption]

     algorithm 2nd 3rd

     application-layer

     authentication approaches

     block ciphers 2nd 3rd

     classical techniques

     computationally secure

     cryptanalysis 2nd

     cryptography 2nd

     cyclic

     Data Encryption Standard (DES) 2nd 3rd 4th

     elliptic curves

     end-to-end

     function, placement of

     IPSec

     Kerberos techniques

     key management

     link

     message

     multiple

     network-layer 2nd

     optimal assymetric encryption padding (OAEP)

     public-key 2nd

     public-key authentication approaches 2nd

     rotor machines

     S-AES 2nd

     SSL

     steganography

     stream ciphers

     substitution techniques

     symmetric 2nd 3rd 4th 5th

     transposition techniques

     unconditionally secure

End entity

End-to-end encryption

     basic approach

     placement of function

Enhanced security services 2nd

EnvelopedData 2nd

Euclidean algorithm

Euler's theorem 2nd

Euler's totient function

Exchanges, ISAKMP

Extension headers, IPv6

Extensions

Категории