Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Abelian group 2nd Access control 2nd 3rd Active attacks Add key function, S-AES Add key layer AK Addressing schemes, network AddRoundKey transformation 2nd Advanced Encryption Standard (AES) 32bit processor 8bit processor AddRoundKey transformation cipher evaluation criteria for implementation aspects importance of key expansion MixColumns transformations 2nd 3rd origins of polynomials with coefficients in GF(28) Rijndael proposal 2nd S-box ShiftRows transformation 2nd simplified structure of substitute bytes (SubBytes) transformation 2nd transformations 2nd 3rd Agrawal-Kayal-Saxena (AKS) algorithm Alert codes, TLS Alert Protocol Algorithms 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th AES key expansion Agrawal-Kayal-Saxena (AKS) CMAC compression cryptographic, S/MIME Data Authentication Data Encryption (DEA) 2nd decompression decryption 2nd deskewing Digital Signature (DSA) encryption 2nd Euclidean Feistel HMAC key schedule Miller-Rabin RC4 Rivest-Shamir-Adleman (RSA) 2nd Secure Hash (SHA) subkey generation Whirlpool Analysis, ease of ANSI X.9.17 PRNG Anti-Replay, IPSec 2nd Antivirus software Applicability statement (AS) Application-level gateway Arbitrated digital signature Arithmetic 2nd 3rd 4th [See also Number theory] elliptic curve modular 2nd polynomial Attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Malicious software, Viruses, Worms] active birthday attacks 2nd brute-force 2nd 3rd chosen ciphertext attack (CCA) confidentiality, locations for cryptanalytic 2nd differential cryptanalysis distributed denial of service (DDoS) identification of known-plaintext man-in-the-middle 2nd meet-in-the-middle 2nd passive replay security 2nd 3rd suppress-replay timing attacks Audit records Authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th algorithm, IPSec applications of birthday attacks 2nd codes Data Authentication Algorithm data origin functions hash functions 2nd 3rd 4th 5th header (AH) 2nd 3rd 4th Kerberos 2nd message authentication code (MAC) 2nd 3rd 4th message encryption 2nd mutual network security services Oakley key determination protocol one-way 2nd peer entity Pretty Good Privacy (PGP) 2nd protocols public-key encryption approaches 2nd public-key infrastructure (PKI) requirements secret key security of hash functions and MACs symmetric encryption approaches 2nd three-way two-way X.509 Authentication dialogue 2nd 3rd 4th authentication service exchange Kerberos version 4 2nd 3rd Kerberos version 5 simple ticket-granting server (TGS) 2nd 3rd Authentication Header (AH) 2nd 3rd 4th Anti-Replay service defined fields information Integrity Check Value (ICV) IPv6 transport mode tunnel mode Authentication Only Exchange 2nd Authority key identifier Availability service Avalanche effect |