Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Packet-filtering router Padding 2nd 3rd 4th 5th 6th cryptographic computations ESP optimal assymetric encryption padding (OAEP) traffic Parasitic virus Passive attacks Password management access control Bloom filter computer-generated Markov model proactive checker protection reactive checking selection strategies UNIX scheme user education vulnerability of passwords Path MTU Payload 2nd 3rd 4th 5th 6th Encapsulating Security (ESP) 2nd 3rd 4th ISAKMP types length Payment, SET authorization capture processing purchase request Peer entity authentication Period of validity Permutation 2nd 3rd 4th DES tables initial 2nd layer SC PGP [See Pretty Good Privacy (PGP)] Pin punctures Plaintext 2nd 3rd Playfair cipher Policy constraints Policy mappings Polyalphabetic cipher Polymorphic virus Polynomial arithmetic 2nd 3rd coefficients in GF(28) coefficients in Zp greatest common divisor, finding MixColumns transformations modular multiplication by x ordinary polynomial ring Ports, source and destination Preoutput, defined Preprocessing, CTR mode Pretty Good Privacy (PGP) 2nd 3rd 4th authentication 2nd compression confidentiality data compression e-mail compatibility key identifiers key rings keys and key rings, cryptographic 2nd messages, transmission and reception of 2nd notation operational description 2nd public-key management random number generation reassembly revoking public keys segmentation session key generation trust, use of use of ZIP, data compression using Prime curve Prime numbers 2nd determination of distribution of Miller-Rabin algorithm properties of testing for Prime polynomial Primitive root Private key 2nd 3rd 4th encryption ring RSA, efficient operation using usage period Proposal (P) payload 2nd Protection profiles (PPs) Protocols, authentication Provable security, CTR mode Pseudorandom function (PRF), TLS Pseudorandom numbers 2nd 3rd 4th ANSI X9.17 Blum Blum Shub (BBS) generator generators (PRNGs) 2nd 3rd 4th PGP, generation using Public keys 2nd 3rd 4th 5th [See also Public-key cryptography, Public-key encryption] authority certificates cryptography directory of efficient operation of RSA using encryption 2nd 3rd 4th 5th management Pretty Good Privacy (PGP) public announcement of revoking Public-key cryptography authentication protocols digital signal standard (DSS) digital signatures Public-key encryption 2nd 3rd 4th 5th algorithm approaches 2nd cryptography cryptosystems 2nd Diffie-Hellman key exchange elliptic curve cryptography (ECC) key management message authentication number theory Oakley key determination protocol RSA algorithm 2nd Public-key infrastructure (PKI) development of management functions management protocols X.509 (PKIX) Public-key management 2nd approaches to, PGP cryptography for secret key distribution distribution Pretty Good Privacy (PGP) trust, use of Public-key ring Purchase request, SET |