Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Karger, Paul

KDC (key distribution center)

Kennedy, Edward

Kerberos

     access to protected objects

     network controls

     networks

Kernel

Kernelized design

Key Online Banking

Keyless ciphers

Keyrings, e-mail

Keys (encryption)

     clustering

     definition

     distribution

     encryption

     escrow

     exchange

     length

     management

     private [See also AES (Advanced Encryption System); DES (Data Encryption Standard); Symmetric encryption.]

     proliferation

     public [See also Asymmetric encryption; RSA (Rivest-Shamir-Adelman) encryption.]

         characteristics

         definition

         flow diagram

         key proliferation

         purpose of

     RSA (Rivest-Shamir-Adelman) encryption

     transformation

Keystroke logging 2nd

Klein, Joe

Knapsack problem

Knapsacks

     and modular arithmetic

     as cryptographic algorithms

     decryption algorithm

     general

     hard

     MerkleHellman 2nd

     simple 2nd

     superincreasing 2nd

Kneed-to-know security policies

KSOS 2nd

KVM 2nd

Категории