Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] MAC [See Message authentication code (MAC)] Macro virus Mailing List Agent (MLA) Malicious software 2nd backdoor countermeasures 2nd distributed denial of service (DDoS) attacks introduction to 2nd logic bomb Trojan horses viruses 2nd worms zombie Man-in-the-middle attack 2nd Markov process model 2nd Masquerade 2nd Masquerader Master key, defined Master secret creation Maximum distance separable (MDS) Meet-in-the-middle attack 2nd Memory-resident virus Merchant authentication, SET Message authentication code (MAC) 2nd 3rd 4th 5th 6th 7th brute-force attacks cipher-based message authentication code (CMAC) cryptanalysis 2nd Data Authentication Algorithm DES, based on HMAC Internet standard (HMAC) requirements for security of SSL technique TLS use of Message component Message digest 2nd Message encryption 2nd public key symmetric Message integrity, SSl Messages, PGP transmission and reception of 2nd Metamorphic virus Miller-Rabin algorithm MIME [See Multipurpose Internet mail extensions (MIME)] Misfeasor MixColumns transformations 2nd 3rd 4th Modification of messages Modular arithmetic 2nd congruences, properties of divisors logarithms for operations properties of Modulus, defined Monic polynomial Monoalphabetic cipher Morris worm Multiplicative inverse 2nd Multipurpose Internet mail extensions (MIME) canonical form content types multipart, example of overview of transfer encodings Multivariate model Mutual authentication public-key encryption approaches symmetric encryption approaches |