C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Caesar cipher
Canonical form, MIME
Cardholder account authentication, SET
Certificate management messages (CMC)
Certificate management protocols (CMP)
Certificate Request (CR) payload 2nd
Certificate revocation list (CRL)
Certificate_verify message 2nd
Certificates 2nd 3rd 4th 5th 6th 7th 8th
     elements of
     forward
     messages 2nd
     obtaining
     payload 2nd
     policies
     processing
     reverse
     revocation of
     TLS client types
     user
Certificates-only message
Certification authority (CA)
Certification path constraints
Certification, PKIX
Challenge/response
Change Cipher Spec Protocol
Character marking
Chinese remainder theorem (CRT) 2nd
Chosen ciphertext attack (CCA)
Cipher 2nd 3rd 4th [See also Block Ciphers, Symmetric ciphers]
     block
     Caesar
     Feistel
     Hill
     monoalphabetic
     one-time pad
     Playfair
     polyalphabetic
     stream
     transposition
     Vigenère
Cipher block chaining (CBC) mode 2nd
Cipher feedback (CFB) mode
Cipher suites, TLS
Cipher-based message authentication code (CMAC)
Ciphertext 2nd 3rd
Circuit-level gateway
Clandestine error
Class
Clear-signed data 2nd
Client certificate types, TLS
CMAC [See Cipher-based message authentication code (CMAC)]
Coefficient set
Common Criteria (CC)
     protection profiles (PPs)
     requirements
     security targets (STs)
     target of evaluation (TOE)
Commutative ring
Component
Compression 2nd 3rd
     algorithm
     function
     PGP
Computation resistance
Computer Emergency Response Team (CERT)
Computer security
Conditional probability
Confidentiality 2nd 3rd 4th
     attacks, locations for
     encryption function, placement of
     importance of
     key distribution
     local area networks (LANs)
     Pretty Good Privacy (PGP)
     random number generation 2nd
     SET
     SSL
     traffic
Confusion
Congruences, properties of
Congruent modulo (n)
Connection, SSL 2nd
Constant exponentiation time
Constant polynomial
Constraints, X.509 certification
Content modification
Cookie exchange
Counter (CTR) mode 2nd
Covert channel
CRL issuer
Cross certification
CRT [See Chinese remainder theorem (CRT)]
Cryptanalysis 2nd 3rd 4th 5th 6th
     differential
     hash functions
     linear
     message authentication codes (MAC)
     public-key
     types of attacks
Cryptanalytic attack
Cryptographic computations 2nd
     master secret creation
     padding
     parameters, generation of
     SSL
     TSL
Cryptographically generated random numbers
Cryptographically secure pseudorandom bit generator (CSPRBG)
Cryptography 2nd 3rd 4th
     projects for teaching
     public-key
     system dimensions
Cryptology
Cryptosystems
     applications for
     cryptanalysis
     principles of
     public-key
     requirements for
CState
Curves [See Elliptic curve arithmetic, Elliptic curve cryptography]
Cyclic encryption
Cyclic group




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net