[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Kerberos authentication using encryption using Heimdal and MIT implementations padding supported ciphers key agreement key agreement protocols 2nd key exchange Diffie-Hellman protocol and DSA and forward secrecy securing against rollback attacks key schedules key transport protocols key_len key_offset keys [See also cryptography] ASCII hexadecimal, conversion to binary authenticated exchange using RSA binary keys, representing as hexadecimal converting text keys to binary keys cryptographic algorithms, representing for usage in exchange keys generating short-term keys from a long-term key length minimum effective length and security management for message queues public keys, binary representation public keys, recommended lengths random symmetric, generating 2nd representation as English text in plaintext (PEM encoding) public keys vs. symmetric keys RSA decryption using private keys encryption using public keys key pairs, generating signature verification with public keys used in digital signatures secure management session keys, providing forward secrecy while using signed data types and symmetric key-length, choosing third-party validation 2nd variable key sizes, OpenSSL supported keystreams parallelizing generation of precomputing in cipher modes or stream ciphers Kohno, Tadayoshi Kosiur, Dave Krawczyk, Pawel krb_auth_con_getremotesubkey( ) krb5_auth_con_getremotesubkey( ) KRB5_GENERAL_ _ preprocessor macro krb5_recvauth( ) |