Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Radix-64 conversion

Random access, CTR mode

Random delay

Random number generation 2nd 3rd

     ANSI X.9.17 PGP

     ANSI X.9.17 PRNG

     Blum Blum Shub (BBS) generator

     cryptographically

     cyclic encryption

     linear congruential generators

     output feedback (OFB) mode, DES

     Pretty Good Privacy (PGP)

     pseudorandom number generators (PRNGs) 2nd 3rd 4th

     randomness

     skew

     true random number generator (TRNG) 2nd

     unpredictability

     use of

RC4 algorithm

     development of

     initialization of S

     logic of

     stream generation

     strength of 2nd

Reader's guide

Receiver, role of

Record Protocol

Reflector DDoS

Registration authority (RA)

Registration request

Relatively prime

Release of message contents

Reliability, network

Replay

Replay attacks

Repository

Request for Comment (RFC) publication 2nd

Residue 2nd

Revocation request

RFC 822

Rijndael proposal 2nd

Rings (R) 2nd

Rivest-Shamir-Adleman (RSA) algorithm 2nd

     chosen ciphertext attack (CCA)

     complexity of

     computational aspects of

     description of

     development of

     efficient operation of

     exponentiation on modular arithmetic

     factoring problem

     key generation

     optimal assymetric encryption padding (OAEP)

     proof of

     security of

     timing attacks

Root, polynomial

Rotor machines

Rounds 2nd 3rd 4th

     function of

     number of 2nd

     single, details of

Routing header 2nd

RSA algorithm [See Rivest-Shamir-Adleman (RSA) algorithm]

Rule-based intrusion detection 2nd

Категории