A



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Abelian group 2nd
Access control 2nd 3rd
Active attacks
Add key function, S-AES
Add key layer AK
Addressing schemes, network
AddRoundKey transformation 2nd
Advanced Encryption Standard (AES)
     32bit processor
     8bit processor
     AddRoundKey transformation
     cipher
     evaluation criteria for
     implementation aspects
     importance of
     key expansion
     MixColumns transformations 2nd 3rd
     origins of
     polynomials with coefficients in GF(28)
     Rijndael proposal 2nd
     S-box
     ShiftRows transformation 2nd
     simplified
     structure of
     substitute bytes (SubBytes) transformation 2nd
     transformations 2nd 3rd
Agrawal-Kayal-Saxena (AKS) algorithm
Alert codes, TLS
Alert Protocol
Algorithms 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
     AES key expansion
     Agrawal-Kayal-Saxena (AKS)
     CMAC
     compression
     cryptographic, S/MIME
     Data Authentication
     Data Encryption (DEA) 2nd
     decompression
     decryption 2nd
     deskewing
     Digital Signature (DSA)
     encryption 2nd
     Euclidean
     Feistel
     HMAC
     key schedule
     Miller-Rabin
     RC4
     Rivest-Shamir-Adleman (RSA) 2nd
     Secure Hash (SHA)
     subkey generation
     Whirlpool
Analysis, ease of
ANSI X.9.17 PRNG
Anti-Replay, IPSec 2nd
Antivirus software
Applicability statement (AS)
Application-level gateway
Arbitrated digital signature
Arithmetic 2nd 3rd 4th [See also Number theory]
     elliptic curve
     modular 2nd
     polynomial
Attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Malicious software, Viruses, Worms]
     active
     birthday attacks 2nd
     brute-force 2nd 3rd
     chosen ciphertext attack (CCA)
     confidentiality, locations for
     cryptanalytic 2nd
     differential cryptanalysis
     distributed denial of service (DDoS)
     identification of
     known-plaintext
     man-in-the-middle 2nd
     meet-in-the-middle 2nd
     passive
     replay
     security 2nd 3rd
     suppress-replay
     timing attacks
Audit records
Authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
     algorithm, IPSec
     applications of
     birthday attacks 2nd
     codes
     Data Authentication Algorithm
     data origin
     functions
     hash functions 2nd 3rd 4th 5th
     header (AH) 2nd 3rd 4th
     Kerberos 2nd
     message authentication code (MAC) 2nd 3rd 4th
     message encryption 2nd
     mutual
     network security services
     Oakley key determination protocol
     one-way 2nd
     peer entity
     Pretty Good Privacy (PGP) 2nd
     protocols
     public-key encryption approaches 2nd
     public-key infrastructure (PKI)
     requirements
     secret key
     security of hash functions and MACs
     symmetric encryption approaches 2nd
     three-way
     two-way
     X.509
Authentication dialogue 2nd 3rd 4th
     authentication service exchange
     Kerberos version 4 2nd 3rd
     Kerberos version 5
     simple
     ticket-granting server (TGS) 2nd 3rd
Authentication Header (AH) 2nd 3rd 4th
     Anti-Replay service
     defined
     fields
     information
     Integrity Check Value (ICV)
     IPv6
     transport mode
     tunnel mode
Authentication Only Exchange 2nd
Authority key identifier
Availability service
Avalanche effect




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net