S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S-AES [See Simplified Advanced Encryption Standard (S-AES)]
S-box 2nd 3rd 4th 5th
     AES
     design of
     role of 2nd
     S-AES
S/MIME [See Secure/Multipurpose Internet Mail Extension (S/MIME)]
Secret key 2nd
     authentication
     confidentiality
     distribution
     hybrid approach, IBM mainframe
     man-in-the-middle attack
Secure Electronic Transaction (SET)
     development of
     dual signature
     features of
     overview
     payment
     purchase request
     requirements
     system participants
     transaction types
Secure Hash Algorithms (SHA)
     development of
     parameters
     SHA-512
     use of
Secure mailing lists
Secure Socket Layer (SSL)
     Alert Protocol
     architecture
     Change Cipher Spec Protocol
     connection 2nd
     cryptographic parameters, generation of
     Handshake Protocol
     master secret creation
     Record Protocol
     session
Secure/Multipurpose Internet Mail Extension (S/MIME)
     certificate processing
     certificates-only message
     clear signing
     cryptographic algorithms
     development of
     enhanced security services 2nd
     envelopedData
     functionality
     functions
     limitations of
     Mailing List Agent (MLA)
     messages
     MIME entity, securing
     multipurpose Internet mail extensions (MIME)
     registration request
     RFC 822
     secure mailing lists
     security labels 2nd
     signed receipts
     signedData
     user-agent role
     VeriSign certificates 2nd
Security 2nd 3rd 4th 5th 6th [See also Authentication, Network security, System Security]
     attacks 2nd 3rd
     authentication
     brute-force attacks
     computer
     cryptanalysis
     elliptic curve cryptography (ECC)
     hash functions
     information
     internet
     introduction to
     mechanism 2nd 3rd
     message authentication code (MAC)
     network security 2nd 3rd
     OSI architecture
     RSA algorithm
     services 2nd 3rd
     system security
     trends
Security association (SA) 2nd 3rd 4th
     authentication plus confidentiality
     basic combinations, examples of
     combining protocols
     Internet protocol security (IPSec)
     iterated tunneling
     parameters
     payload 2nd
     selectors
     transport adjacency 2nd
     transport-tunnel bundle
Security labels 2nd
Security mechanisms 2nd 3rd
     security services, relationship with
     X.800
Security Parameters Index (SPI)
Security Police Database (SPD)
Security protocol identifier
Security services 2nd 3rd 4th
     access control
     authentication
     availability
     data confidentiality
     data integrity
     defined 2nd
     nonrepudiation
     security mechanisms, relationship with
     X.800
Security targets (STs)
Sender, role of
Sequence Counter Overflow
Sequence modification
Sequence Number Counter
Serial number
Service control
Service threats
Session key 2nd
Session key component
Session security model (SSM)
Session, SSL
SHA-512 algorithm
     logic
     processing steps
     round function
ShiftRows transformation 2nd 3rd
Signature 2nd 3rd 4th
     algorithm identifier
     component
     trust field
Signature (SIG) payload 2nd
Signed receipts
SignedData 2nd
Simplicity, CTR mode
Simplified Advanced Encryption Standard (S-AES)
     add key function
     decryption 2nd
     development of
     encryption 2nd
     key expansion
     mix column function
     nibble substitution
     overview of
     S-box
     shift row function
     structure
     transformations
Single round, details of
Skew
Sliding history buffer
Software efficiency, CTR mode
Source IP Address 2nd 3rd
Source repudiation
Standards
     importance of
     Internet
     National Institute of Standards and Technology
State array
Stateful inspection firewalls
Statistical anomaly intrusion detection 2nd
Stealth virus
Steganography
Store-and-forward communications
Stream ciphers 2nd
     design considerations
     keystream
     RC4 algorithm
     structure
Stream generation
Strict avalanche criterion (SAC)
Strong collision resistance 2nd
Subject attributes 2nd
     alternative name
     directory attributes
     key identifier
     name
     public-key information
     unique identifier
Subkey generation algorithm
Substitute bytes (SubBytes) transformation 2nd
Substitution techniques 2nd
     Caesar cipher
     Hill cipher
     monoalphabetic cypher
     one-time pad
     Playfair cipher
     polyalphabetic cipher
Subtypes, MIME
SunOS system events, intrusion detection
Suppress-replay attacks
Symmetric ciphers
     Advanced Encryption Standard (AES)
     block ciphers 2nd
     confidentiality
     Data Encryption Standard (DES) 2nd
     encryption techniques
     finite fields
     model
     multiple encryption and triple DES
     RC4
     stream ciphers
Symmetric encryption 2nd 3rd 4th 5th
     authentication approaches 2nd
     authentication function
     cipher model
     Oakley key determination protocol
System security
     firewalls 2nd
     intruders 2nd
     malicious software 2nd




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net