Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S-AES [See Simplified Advanced Encryption Standard (S-AES)]

S-box 2nd 3rd 4th 5th

     AES

     design of

     role of 2nd

     S-AES

S/MIME [See Secure/Multipurpose Internet Mail Extension (S/MIME)]

Secret key 2nd

     authentication

     confidentiality

     distribution

     hybrid approach, IBM mainframe

     man-in-the-middle attack

Secure Electronic Transaction (SET)

     development of

     dual signature

     features of

     overview

     payment

     purchase request

     requirements

     system participants

     transaction types

Secure Hash Algorithms (SHA)

     development of

     parameters

     SHA-512

     use of

Secure mailing lists

Secure Socket Layer (SSL)

     Alert Protocol

     architecture

     Change Cipher Spec Protocol

     connection 2nd

     cryptographic parameters, generation of

     Handshake Protocol

     master secret creation

     Record Protocol

     session

Secure/Multipurpose Internet Mail Extension (S/MIME)

     certificate processing

     certificates-only message

     clear signing

     cryptographic algorithms

     development of

     enhanced security services 2nd

     envelopedData

     functionality

     functions

     limitations of

     Mailing List Agent (MLA)

     messages

     MIME entity, securing

     multipurpose Internet mail extensions (MIME)

     registration request

     RFC 822

     secure mailing lists

     security labels 2nd

     signed receipts

     signedData

     user-agent role

     VeriSign certificates 2nd

Security 2nd 3rd 4th 5th 6th [See also Authentication, Network security, System Security]

     attacks 2nd 3rd

     authentication

     brute-force attacks

     computer

     cryptanalysis

     elliptic curve cryptography (ECC)

     hash functions

     information

     internet

     introduction to

     mechanism 2nd 3rd

     message authentication code (MAC)

     network security 2nd 3rd

     OSI architecture

     RSA algorithm

     services 2nd 3rd

     system security

     trends

Security association (SA) 2nd 3rd 4th

     authentication plus confidentiality

     basic combinations, examples of

     combining protocols

     Internet protocol security (IPSec)

     iterated tunneling

     parameters

     payload 2nd

     selectors

     transport adjacency 2nd

     transport-tunnel bundle

Security labels 2nd

Security mechanisms 2nd 3rd

     security services, relationship with

     X.800

Security Parameters Index (SPI)

Security Police Database (SPD)

Security protocol identifier

Security services 2nd 3rd 4th

     access control

     authentication

     availability

     data confidentiality

     data integrity

     defined 2nd

     nonrepudiation

     security mechanisms, relationship with

     X.800

Security targets (STs)

Sender, role of

Sequence Counter Overflow

Sequence modification

Sequence Number Counter

Serial number

Service control

Service threats

Session key 2nd

Session key component

Session security model (SSM)

Session, SSL

SHA-512 algorithm

     logic

     processing steps

     round function

ShiftRows transformation 2nd 3rd

Signature 2nd 3rd 4th

     algorithm identifier

     component

     trust field

Signature (SIG) payload 2nd

Signed receipts

SignedData 2nd

Simplicity, CTR mode

Simplified Advanced Encryption Standard (S-AES)

     add key function

     decryption 2nd

     development of

     encryption 2nd

     key expansion

     mix column function

     nibble substitution

     overview of

     S-box

     shift row function

     structure

     transformations

Single round, details of

Skew

Sliding history buffer

Software efficiency, CTR mode

Source IP Address 2nd 3rd

Source repudiation

Standards

     importance of

     Internet

     National Institute of Standards and Technology

State array

Stateful inspection firewalls

Statistical anomaly intrusion detection 2nd

Stealth virus

Steganography

Store-and-forward communications

Stream ciphers 2nd

     design considerations

     keystream

     RC4 algorithm

     structure

Stream generation

Strict avalanche criterion (SAC)

Strong collision resistance 2nd

Subject attributes 2nd

     alternative name

     directory attributes

     key identifier

     name

     public-key information

     unique identifier

Subkey generation algorithm

Substitute bytes (SubBytes) transformation 2nd

Substitution techniques 2nd

     Caesar cipher

     Hill cipher

     monoalphabetic cypher

     one-time pad

     Playfair cipher

     polyalphabetic cipher

Subtypes, MIME

SunOS system events, intrusion detection

Suppress-replay attacks

Symmetric ciphers

     Advanced Encryption Standard (AES)

     block ciphers 2nd

     confidentiality

     Data Encryption Standard (DES) 2nd

     encryption techniques

     finite fields

     model

     multiple encryption and triple DES

     RC4

     stream ciphers

Symmetric encryption 2nd 3rd 4th 5th

     authentication approaches 2nd

     authentication function

     cipher model

     Oakley key determination protocol

System security

     firewalls 2nd

     intruders 2nd

     malicious software 2nd

Категории