Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Data 2nd 3rd 4th 5th access control compression using ZIP confidentiality integrity 2nd origin authentication sensitivity level Data Encryption Algorithm (DEA) 2nd Data Encryption Standard (DES) 2nd 3rd 4th 5th 56bit keys, use of algorithm, nature of avalanche effect Data Authentication Algorithm decryption design criteria differential cryptanalysis double encryption importance of key generation 2nd known-plaintext attack linear cryptanalysis meet-in-the-middle attack message authentication code (MAC) multiple encryption 2nd permutation, initial 2nd reduction to single stage single round, details of strength of timing attacks triple use of 2nd DDoS [See Distributed denial of service (DDoS) attacks] Decentralized key control 2nd Decompression algorithm Decryption 2nd 3rd 4th 5th 6th 7th 8th algorithm 2nd DES elliptic curves Feistel algorithm S-AES 2nd Delete (D) payload 2nd Denial of service Design 2nd 3rd block cipher principles DES criteria firewalls function F HMAC key schedule algorithm rounds, number of S-Box Deskewing algorithms Destination IP Address 2nd 3rd Destination Options header 2nd Destination repudiation Differential cryptanalysis Diffie-Hellman key exchange 2nd 3rd algorithm analog of anonymous ephemeral fixed man-in-the-middle attack protocols SSL use of Diffusion 2nd layer MR method of Digital immune system Digital signatures 2nd algorithm (DSA) arbitrated authentication protocols direct Oakley key determination protocol requirements standard (DSS) Direct DDoS Direct digital signature Direction control Disclosure Discrete logarithms calculation of modular arithmetic modulo n powers of an integer use of Distributed denial of service (DDoS) attacks constructing consumes data transmission resources countermeasures direct internal resource reflector scanning strategies Distributed intrusion detection Divisors Domain of Interpretation (DOI) DS/ESN 2nd Dual signature, SET |