Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Packet-filtering router

Padding 2nd 3rd 4th 5th 6th

     cryptographic computations

     ESP

     optimal assymetric encryption padding (OAEP)

     traffic

Parasitic virus

Passive attacks

Password management

     access control

     Bloom filter

     computer-generated

     Markov model

     proactive checker

     protection

     reactive checking

     selection strategies

     UNIX scheme

     user education

     vulnerability of passwords

Path MTU

Payload 2nd 3rd 4th 5th 6th

     Encapsulating Security (ESP) 2nd 3rd 4th

     ISAKMP types

     length

Payment, SET

     authorization

     capture

     processing

     purchase request

Peer entity authentication

Period of validity

Permutation 2nd 3rd 4th

     DES tables

     initial 2nd

     layer SC

PGP [See Pretty Good Privacy (PGP)]

Pin punctures

Plaintext 2nd 3rd

Playfair cipher

Policy constraints

Policy mappings

Polyalphabetic cipher

Polymorphic virus

Polynomial arithmetic 2nd 3rd

     coefficients in GF(28)

     coefficients in Zp

     greatest common divisor, finding

     MixColumns transformations

     modular

     multiplication by x

     ordinary

     polynomial ring

Ports, source and destination

Preoutput, defined

Preprocessing, CTR mode

Pretty Good Privacy (PGP) 2nd 3rd 4th

     authentication 2nd

     compression

     confidentiality

     data compression

     e-mail compatibility

     key identifiers

     key rings

     keys and key rings, cryptographic 2nd

     messages, transmission and reception of 2nd

     notation

     operational description 2nd

     public-key management

     random number generation

     reassembly

     revoking public keys

     segmentation

     session key generation

     trust, use of

     use of

     ZIP, data compression using

Prime curve

Prime numbers 2nd

     determination of

     distribution of

     Miller-Rabin algorithm

     properties of

     testing for

Prime polynomial

Primitive root

Private key 2nd 3rd 4th

     encryption

     ring

     RSA, efficient operation using

     usage period

Proposal (P) payload 2nd

Protection profiles (PPs)

Protocols, authentication

Provable security, CTR mode

Pseudorandom function (PRF), TLS

Pseudorandom numbers 2nd 3rd 4th

     ANSI X9.17

     Blum Blum Shub (BBS) generator

     generators (PRNGs) 2nd 3rd 4th

     PGP, generation using

Public keys 2nd 3rd 4th 5th [See also Public-key cryptography, Public-key encryption]

     authority

     certificates

     cryptography

     directory of

     efficient operation of RSA using

     encryption 2nd 3rd 4th 5th

     management

     Pretty Good Privacy (PGP)

     public announcement of

     revoking

Public-key cryptography

     authentication protocols

     digital signal standard (DSS)

     digital signatures

Public-key encryption 2nd 3rd 4th 5th

     algorithm approaches 2nd

     cryptography

     cryptosystems 2nd

     Diffie-Hellman key exchange

     elliptic curve cryptography (ECC)

     key management

     message authentication

     number theory

     Oakley key determination protocol

     RSA algorithm 2nd

Public-key infrastructure (PKI)

     development of

     management functions

     management protocols

     X.509 (PKIX)

Public-key management 2nd

     approaches to, PGP

     cryptography for secret key distribution

     distribution

     Pretty Good Privacy (PGP)

     trust, use of

Public-key ring

Purchase request, SET

Категории