K



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Kerberos 2nd
     authentication dialogue 2nd 3rd 4th
     development of
     differences between versions
     encryption techniques
     justification of elements, version 4
     message exchanges, version 4
     motivation
     principal
     realm 2nd
     ticket flags, version 5
     version 4 2nd
     version 5
Key distribution 2nd 3rd
     authentication 2nd
     center (KDC) 2nd
     controlling usage 2nd
     decentralized key control 2nd
     hierarchical key control
     scenario
     session key lifetime
     technique
     transparent key control 2nd
Key exchange (KE) 2nd 3rd
     Diffie-Hellman 2nd 3rd
     Fortezza
     methods, SSL
     payload 2nd
     RSA
Key expansion 2nd 3rd
     AES algorithm
     block cipher W
     S-AES algorithm
Key generation 2nd 3rd 4th 5th
     DES algorithm 2nd
     RSA algorithm 2nd
     S/MIME
Key ID 2nd
Key identifiers
Key legitimacy field
Key management 2nd 3rd
     automated
     distribution of 2nd
     Internet Security Association and Key Management Protocol (ISAKMP) 2nd
     IPSec 2nd
     manual
     Oakley key determination protocol 2nd
     public keys
     RSA algorithm
     secret keys
Key pair recovery
Key pair update
Key rings
Key schedule algorithm
Key size
Key usage
Keystream
Known-plaintext attack
KState




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net