[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] ECB (Electronic Code Book) mode 2nd OpenSSL block cipher implementations block cipher setup effective vs. real user and group IDs effective, real and saved effective, real, and saved EGADS (Entropy Gathering and Distribution System) security supported platforms egads_destroy( ) egads_entropy( ) egads_init( ) egads_randfname( ) egads_randint( ) egads_randlong( ) egads_randrange( ) egads_randreal( ) egads_randstring( ) egads_randuint( ) egads_randulong( ) egads_randuniform( ) EGD (Entropy Gathering Daemon) commands risks as an entropy source socket directory ELF-based Unix and environment variables elf_get_entry( ) elliptic curve cryptography licensing addresses, validating confirming requests via lexical rules, validation against email, certificates for use in EME-OAEP padding ENCMAP data type encrypt-then-authenticate paradigm encrypt_within_charset( ) encryption in a single reduced character set Kerberos, using message integrity and parallelizing in modes that allow it using hash functions encryption algorithms choosing supporting multiple algorithms ÒEncryption QueueÓ implementation of CWC endianess endpwent( ) Enhanced SNACC ASN.1 compiler, source entropy adding, reasons for collection tips compression of entropy-containing data determining required quantity EGADS (Entropy Gathering and Distribution System), using EGD and compatible third-party tools entropy harvesters estimation and management attacks on entropy sources disk access, entropy in insecurity of boot time as entropy source key presses, entropy in mouse events, entropy in network data, entropy in sound devices, entropy in thread timing and system state, entropy in threat models timestamps, entropy in Unix systems, observable entropy fractional bits generic API for getting at startup key length and keyboards, gathering from Unix Windows mouse events, gathering from in Windows system state, gathering from thread timings, gathering from Unix tools for generating usefulness whitening Entropy Gathering and Distribution System [See EGADS] Entropy Gathering Daemon [See EGD] ENTROPY_PER_SAMPLE macro enveloping interfaces environ global variable (C language) environment validation environment variables CGI scripts, used by deleting inheritance obtaining protecting from exploitation secure usage TZ (time zone) Unix and Windows dependencies value, changing ephemeral Diffie-Hellman ephemeral keying equals (=), base64 padding character erasing files securely error handling evaluating URL encodings event-driven systems and shatter attacks EVP_CIPHER_CTX_cipher( ) EVP_CIPHER_CTX_ctrl( ) EVP_CIPHER_CTX_init( ) EVP_CIPHER_CTX_mode( ) EVP_CIPHER_CTX_set_key_length( ) 2nd EVP_CIPHER_CTX_set_padding( ) EVP_DecryptFinal_ex( ) EVP_DecryptInit( ) EVP_DecryptInit_ex( ) 2nd EVP_DigestFinal( ) EVP_EncryptFinal_ex( ) 2nd EVP_EncryptInit( ) EVP_EncryptInit_ex( ) 2nd 3rd EVP_EncryptUpdate( ) 2nd EVP_get_cipherbyname( ) EVP_MD_CTX_size( ) exception handling C language C++ XXL, compared to XXL library exchange keys exclusive locks exec*( ) family of functions executing external programs securely Unix Windows execv( ) execve( ) 2nd 3rd extKeyUsage extension extracting raw key data from a CryptoAPI key object |