Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Kerberos 2nd

     authentication dialogue 2nd 3rd 4th

     development of

     differences between versions

     encryption techniques

     justification of elements, version 4

     message exchanges, version 4

     motivation

     principal

     realm 2nd

     ticket flags, version 5

     version 4 2nd

     version 5

Key distribution 2nd 3rd

     authentication 2nd

     center (KDC) 2nd

     controlling usage 2nd

     decentralized key control 2nd

     hierarchical key control

     scenario

     session key lifetime

     technique

     transparent key control 2nd

Key exchange (KE) 2nd 3rd

     Diffie-Hellman 2nd 3rd

     Fortezza

     methods, SSL

     payload 2nd

     RSA

Key expansion 2nd 3rd

     AES algorithm

     block cipher W

     S-AES algorithm

Key generation 2nd 3rd 4th 5th

     DES algorithm 2nd

     RSA algorithm 2nd

     S/MIME

Key ID 2nd

Key identifiers

Key legitimacy field

Key management 2nd 3rd

     automated

     distribution of 2nd

     Internet Security Association and Key Management Protocol (ISAKMP) 2nd

     IPSec 2nd

     manual

     Oakley key determination protocol 2nd

     public keys

     RSA algorithm

     secret keys

Key pair recovery

Key pair update

Key rings

Key schedule algorithm

Key size

Key usage

Keystream

Known-plaintext attack

KState

Категории