[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] C++ language buffer overflows and exception handling use of memory, risks associated with C language buffer overflows and exception handling canary capture replay attacks, preventing CAs (certification authorities) 2nd 3rd root certificates fingerprints and obtaining obtaining and checking CAST5, supported key sizes CBC (Cipher Block Chaining) mode 2nd block cipher setup, OpenSSL calculating message output length high-level API incremental decryption incremental encryption PKCS #11 compliance incremental initialization padding OpenSSL, disabling in switching off parallelization issues SPC_CBC_CTX data type cbc_set_padding( ) CCM (CTR plus CBC-MAC) mode precomputing keystream for CERT_CONTEXT objects CertEnumCertificatesInStore( ) CertFreeCertificateContext( ) CertFreeCRLContext( ) CertGetIssuerCertificateFromStore( ) CertGetNameStringW( ) Certicom Certificate Management Library certificate revocation certificate revocation lists [See CRLs] certificates 2nd binary representation certificate hierarchies 2nd certificate revocation lists [See CRLs] certificate signing requests (CSRs) code-signing certificates obtaining personal certificates precedence of fields purposes representing in plaintext (PEM encoding) self-signed certificates term of validity trusted list, adding to verification adding hostname checking to against whitelists web site certificates X.509 certificates [See X.509 certificates] certification authorities [See CAs] CertOpenSystemStore( ) CFB (Cipher Feedback) mode 2nd block cipher setup, OpenSSL block size high-level API initialization parallelization issues PKCS #11 compliance SPC_CFB_CTX data type cfb_decrypt_update( ) cfmakeraw( ) CGI scripts, environment variables used by chain responders Chandra, Pravir check_spoofdns( ) checking message integrity checksum algorithms, using for software protection Chen, Hao child processes, creating securely chroot( ) 2nd jail( ), compared to cipher instantiation reference ciphers configurable key lengths modes 2nd parallelization of encryption and decryption selecting padding adding and checking disabling in OpenSSL in CBC mode variable key length, usage in OpenSSL ciphertext stealing (CTS) mode Class 1 Digital ID clock cycles, counting clock( ) CMAC 2nd cmac_cleanup( ) cmac_final( ) cmac_mac( ) cmac_update( ) code_len code_offset collision attacks collision resistance and one-wayness command-line arguments, environment variables as separators confirming requests via email converting binary strings to integers for use with RSA integers to binary strings for use with RSA text keys to binary keys Cookie headers cookie theft cookies authentication using core dumps, security aspects cpuid instruction Crack CrackLib CRAM (Challenge-Response Authentication Mechanism) crashes, disabling memory dumps during CRC32 algorithm crc32_calc( ) CreateDialog( ) progress bar control, need for CreateJobObject( ) CreateMutex( ) CreateProcess( ) CreateProcessAsUser( ) 2nd 3rd CreateRestrictedToken( ) creating files for temporary use cRLDistributionPoints extensions 2nd CRLs (certificate revocation lists) 2nd CryptoAPI, obtaining with OpenSSL, obtaining with HTTP client for server connection cross-site scripting attacks 2nd JavaScript code injection preventing crypt( ) password-based authentication using CRYPT_VERIFYCONTEXT flag CryptAcquireContext( ) 2nd 3rd CryptCreateHash( ) 2nd CryptDecrypt( ) CryptDeriveKey( ) 2nd CryptDestroyHash( ) CryptDestroyKey( ) CryptEncrypt( ) CryptExportKey( ) 2nd CryptGenKey( ) CryptGenRandom( ) 2nd CryptGetHashParam( ) CryptGetUserKey( ) 2nd CryptHashCertificate( ) CryptHashData( ) CryptImportKey( ) 2nd CryptoAPI certificate stores CRLs, obtaining with design features extracting raw key data from key objects key object creation with raw key data MAC implementations message authentication via HMAC public key cryptography issues symmetric encryption using X.509 certificate verification using CryptoExportKey( ) cryptographic hash algorithms cryptographic hash functions algorithms properties collision resistance and one-wayness desirable characteristics patents PRNGs, using as whitening, using for cryptographic hashes cryptographic primitives, timing Cryptographic Service Providers [See CSPs] cryptography [See also symmetric cryptography] algorithms, comparing CPU clock speed and elliptic curve cryptography keys random symmetric, generating representation, public vs. symmetric machines, comparing one-time values public key [See public key cryptography] symmetric primitives CryptReleaseContext( ) CryptSetHashParam( ) CryptSetKeyParam( ) CSPs (Cryptographic Service Providers) 2nd supported symmetric ciphers CSS [See cross-site scripting attacks] CTR (counter) mode 2nd high-level API MACs, conversion into stream ciphers using nonce PKCS #11 compliance precomputing keystream for SPC_CTR_CTX data type CTS (ciphertext stealing) mode current_stamp( ) entropy gathering, using for CWC (Carter-Wegman + CTR) mode 2nd Brian GladmanÕs implementation in a high-level encryption and decryption API local_options.h file precomputing keystream for cwc_cleanup( ) cwc_decrypt_message( ) 2nd cwc_encrypt_message( ) cwc_init( ) |