Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Target of evaluation (TOE)

Technical specifications (TS)

Threats 2nd

Ticket flags

Ticket-granting server (TGS)

Time complexity

Time series model

Time to Live (TTL)

Timestamps 2nd 3rd

Timing attacks 2nd

Timing modification

Traffic analysis 2nd

Traffic confidentiality

Traffic padding

Transfer encodings, MIME

Transform (T) payload 2nd

Transformations 2nd 3rd 4th

     AddRoundKey

     AES 2nd

     equivalent inverse ciphers

     forward 2nd 3rd 4th

     interchanging AddRoundKey and InvMixColumns

     inverse 2nd 3rd 4th

     MixColumns transformations 2nd 3rd

     nibble substitution

     S-AES

     S-box 2nd

     ShiftRows transformation 2nd 3rd

     substitute bytes (SubBytes) 2nd

Transparent key control 2nd

Transport adjacency 2nd

Transport layer functionality (TCP)

Transport Layer Protocol

Transport Layer Security (TLS)

     alert codes

     certificate_verify message

     cipher suites

     client certificate types

     finished messages

     message authentication code

     pseudorandom function (PRF)

     version number

Transport mode 2nd 3rd 4th 5th

     AH

     ESP 2nd

     IPSec overview of 2nd

Transport-tunnel bundle

Transposition techniques

Triple EDS

Trojan horses 2nd

True random number generator (TRNG) 2nd

Trust

     example of

     flags 2nd

     key legitimacy field

     owner field

     PGP use of

     signature field

Trusted systems

     concept of

     data access control

     defined

     Trojan horse defense

Tunnel mode 2nd 3rd 4th 5th

     AH

     ESP 2nd 3rd

     IPSec overview of

Категории