[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Rabin-Miller test race conditions 2nd rand( ) RAND_add( ) RAND_bytes( ) RAND_load_file( ) RAND_pseudo_bytes( ), insecurity of RAND_seed( ) RAND_write_file( ) random identifiers, usage in email confirmations random nonces vs. sequential random numbers data with entropy, compressing into a fixed-size seed determining what kind to use entropy harvesters and PRNGs entropy gathering [See entropy, gathering] generating for shared secrets on Unix without /dev/random and urandom devices generic API for OpenSSL random number API pseudo-random number generators [See PRNGs] random floating-point values, getting nonuniform distribution uniform distribution random integer in a range, getting random integers, getting random printable ASCII strings converting to generating, security and string length shuffling fairly statistically testing continuous output test power-up and on-demand tests Unix, generating in Windows, generating in random( ) RAs (registration authorities) raw data, hexadecimal representation RC2 algorithm, effective key bits function, OpenSSL RC4 algorithm 2nd limits as random number source LION setting up and using stream cipher as PRNG supported key sizes using in self-modifying code RC5 algorithm number of rounds, configuration in OpenSSL supported key sizes RDTSC instruction vs. gettimeofday( ) read( ) read_data( ) readpassphrase( ) readpassphrase.h header file real vs. effective user and group IDs realpath( ) thread-safety, lack of REBUILD_VAR macro recipes for Unix for Windows OS compatibility registration authorities (RAs) relative paths remove_private_key( ) replay attacks, prevention using sequential nonces representing binary keys as hexadecimal representing keys (or other binary data) as English text representing keys and certificates in plaintext (PEM encoding) representing keys for use in cryptographic algorithms representing public keys and certificates in binary (DER encoding) resource starvation attacks preventing on Unix on Windows restricted tokens restricting access permissions for new files (Unix) restricting filesystem access on Unix restricting filesystem and network access on BSD restricting privileges RetrieveWebData( ) RFC 822, email syntax Rijndael ring0 debuggers RIPEMD-160 algorithm Rivest, Ron 2nd RMAC 2nd rollback attacks 2nd root certificates CAs, list obtaining and checking validating Root Report RSA algorithm 2nd authenticated key exchange MACs, usage complexity of implementation converting binary strings to integers for use with converting integers to binary strings DER-encoding of public keys dictionary attacks and EME-OAEP padding generating key pairs and man-in-the-middle attacks padding and private keys, decryption using private keys, signing with public keys, encryption using raw decryption using a private key raw encryption with a public key recommended key lengths secure signing and encryption signature verification with public keys symmetric encryption, usage in implementations RSA_blinding_on( ) RSA_generate_key( ) RSA_private_decrypt( ) RSA_public_encrypt( ) 2nd 3rd RSA_sign( ) RSA_size( ) RSASSA-PKCS1v1.5 signing standard RSASSA-PSS digital signing standard RtlSecureMemory( ) |