D



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Data 2nd 3rd 4th 5th
     access control
     compression using ZIP
     confidentiality
     integrity 2nd
     origin authentication
     sensitivity level
Data Encryption Algorithm (DEA) 2nd
Data Encryption Standard (DES) 2nd 3rd 4th 5th
     56bit keys, use of
     algorithm, nature of
     avalanche effect
     Data Authentication Algorithm
     decryption
     design criteria
     differential cryptanalysis
     double
     encryption
     importance of
     key generation 2nd
     known-plaintext attack
     linear cryptanalysis
     meet-in-the-middle attack
     message authentication code (MAC)
     multiple encryption 2nd
     permutation, initial 2nd
     reduction to single stage
     single round, details of
     strength of
     timing attacks
     triple
     use of 2nd
DDoS [See Distributed denial of service (DDoS) attacks]
Decentralized key control 2nd
Decompression algorithm
Decryption 2nd 3rd 4th 5th 6th 7th 8th
     algorithm 2nd
     DES
     elliptic curves
     Feistel algorithm
     S-AES 2nd
Delete (D) payload 2nd
Denial of service
Design 2nd 3rd
     block cipher principles
     DES criteria
     firewalls
     function F
     HMAC
     key schedule algorithm
     rounds, number of
     S-Box
Deskewing algorithms
Destination IP Address 2nd 3rd
Destination Options header 2nd
Destination repudiation
Differential cryptanalysis
Diffie-Hellman key exchange 2nd 3rd
     algorithm
     analog of
     anonymous
     ephemeral
     fixed
     man-in-the-middle attack
     protocols
     SSL
     use of
Diffusion 2nd
     layer MR
     method of
Digital immune system
Digital signatures 2nd
     algorithm (DSA)
     arbitrated
     authentication protocols
     direct
     Oakley key determination protocol
     requirements
     standard (DSS)
Direct DDoS
Direct digital signature
Direction control
Disclosure
Discrete logarithms
     calculation of
     modular arithmetic
     modulo n
     powers of an integer
     use of
Distributed denial of service (DDoS) attacks
     constructing
     consumes data transmission resources
     countermeasures
     direct
     internal resource
     reflector
     scanning strategies
Distributed intrusion detection
Divisors
Domain of Interpretation (DOI)
DS/ESN 2nd
Dual signature, SET




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net