Index R

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Rabin-Miller test 
race conditions  2nd 
rand( ) 
RAND_add( ) 
RAND_bytes( ) 
RAND_load_file( ) 
RAND_pseudo_bytes( ), insecurity of 
RAND_seed( ) 
RAND_write_file( ) 
random identifiers, usage in email confirmations 
random nonces vs. sequential 
random numbers 
    data with entropy, compressing into a fixed-size seed 
    determining what kind to use 
        entropy harvesters and PRNGs 
    entropy gathering  [See entropy, gathering]
    generating
        for shared secrets 
        on Unix without /dev/random and urandom devices 
    generic API for 
    OpenSSL random number API 
    pseudo-random number generators  [See PRNGs]
    random floating-point values, getting
        nonuniform distribution 
        uniform distribution 
    random integer in a range, getting 
    random integers, getting 
    random printable ASCII strings
        converting to 
        generating, security and string length 
    shuffling fairly 
    statistically testing 
        continuous output test 
        power-up and on-demand tests 
    Unix, generating in 
    Windows, generating in 
random( ) 
RAs (registration authorities) 
raw data, hexadecimal representation 
RC2 algorithm, effective key bits function, OpenSSL 
RC4 algorithm  2nd 
    limits as random number source 
    LION 
    setting up and using 
    stream cipher as PRNG 
    supported key sizes 
    using in self-modifying code 
RC5 algorithm
    number of rounds, configuration in OpenSSL 
    supported key sizes 
RDTSC instruction 
    vs. gettimeofday( ) 
read( ) 
read_data( ) 
readpassphrase( ) 
readpassphrase.h header file 
real vs. effective user and group IDs 
realpath( ) 
    thread-safety, lack of 
REBUILD_VAR macro 
recipes 
    for Unix 
    for Windows 
    OS compatibility 
registration authorities (RAs) 
relative paths 
remove_private_key( ) 
replay attacks, prevention using sequential nonces 
representing binary keys as hexadecimal 
representing keys (or other binary data) as English text 
representing keys and certificates in plaintext (PEM encoding) 
representing keys for use in cryptographic algorithms 
representing public keys and certificates in binary (DER encoding) 
resource starvation attacks
    preventing 
        on Unix 
        on Windows 
restricted tokens 
restricting access permissions for new files (Unix) 
restricting filesystem access on Unix 
restricting filesystem and network access on BSD 
restricting privileges 
RetrieveWebData( ) 
RFC 822, email syntax 
Rijndael 
ring0 debuggers 
RIPEMD-160 algorithm 
Rivest, Ron  2nd 
RMAC  2nd 
rollback attacks  2nd 
root certificates 
    CAs, list 
    obtaining and checking 
    validating 
Root Report 
RSA algorithm  2nd 
    authenticated key exchange 
        MACs, usage 
    complexity of implementation 
    converting binary strings to integers for use with 
    converting integers to binary strings 
    DER-encoding of public keys 
    dictionary attacks and 
    EME-OAEP padding 
    generating key pairs 
    and man-in-the-middle attacks 
    padding and 
    private keys, decryption using 
    private keys, signing with 
    public keys, encryption using 
    raw decryption using a private key 
    raw encryption with a public key 
    recommended key lengths 
    secure signing and encryption 
    signature verification with public keys 
    symmetric encryption, usage in implementations 
RSA_blinding_on( ) 
RSA_generate_key( ) 
RSA_private_decrypt( ) 
RSA_public_encrypt( )  2nd  3rd 
RSA_sign( ) 
RSA_size( ) 
RSASSA-PKCS1v1.5 signing standard 
RSASSA-PSS digital signing standard 
RtlSecureMemory( ) 



Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
ISBN: 0596003943
EAN: 2147483647
Year: 2005
Pages: 266

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net