Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

MAC [See Message authentication code (MAC)]

Macro virus

Mailing List Agent (MLA)

Malicious software 2nd

     backdoor

     countermeasures 2nd

     distributed denial of service (DDoS) attacks

     introduction to 2nd

     logic bomb

     Trojan horses

     viruses 2nd

     worms

     zombie

Man-in-the-middle attack 2nd

Markov process model 2nd

Masquerade 2nd

Masquerader

Master key, defined

Master secret creation

Maximum distance separable (MDS)

Meet-in-the-middle attack 2nd

Memory-resident virus

Merchant authentication, SET

Message authentication code (MAC) 2nd 3rd 4th 5th 6th 7th

     brute-force attacks

     cipher-based message authentication code (CMAC)

     cryptanalysis 2nd

     Data Authentication Algorithm

     DES, based on

     HMAC

     Internet standard (HMAC)

     requirements for

     security of

     SSL

     technique

     TLS

     use of

Message component

Message digest 2nd

Message encryption 2nd

     public key

     symmetric

Message integrity, SSl

Messages, PGP transmission and reception of 2nd

Metamorphic virus

Miller-Rabin algorithm

MIME [See Multipurpose Internet mail extensions (MIME)]

Misfeasor

MixColumns transformations 2nd 3rd 4th

Modification of messages

Modular arithmetic 2nd

     congruences, properties of

     divisors

     logarithms for

     operations

     properties of

Modulus, defined

Monic polynomial

Monoalphabetic cipher

Morris worm

Multiplicative inverse 2nd

Multipurpose Internet mail extensions (MIME)

     canonical form

     content types

     multipart, example of

     overview of

     transfer encodings

Multivariate model

Mutual authentication

     public-key encryption approaches

     symmetric encryption approaches

Категории