P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Packet-filtering router
Padding 2nd 3rd 4th 5th 6th
     cryptographic computations
     ESP
     optimal assymetric encryption padding (OAEP)
     traffic
Parasitic virus
Passive attacks
Password management
     access control
     Bloom filter
     computer-generated
     Markov model
     proactive checker
     protection
     reactive checking
     selection strategies
     UNIX scheme
     user education
     vulnerability of passwords
Path MTU
Payload 2nd 3rd 4th 5th 6th
     Encapsulating Security (ESP) 2nd 3rd 4th
     ISAKMP types
     length
Payment, SET
     authorization
     capture
     processing
     purchase request
Peer entity authentication
Period of validity
Permutation 2nd 3rd 4th
     DES tables
     initial 2nd
     layer SC
PGP [See Pretty Good Privacy (PGP)]
Pin punctures
Plaintext 2nd 3rd
Playfair cipher
Policy constraints
Policy mappings
Polyalphabetic cipher
Polymorphic virus
Polynomial arithmetic 2nd 3rd
     coefficients in GF(28)
     coefficients in Zp
     greatest common divisor, finding
     MixColumns transformations
     modular
     multiplication by x
     ordinary
     polynomial ring
Ports, source and destination
Preoutput, defined
Preprocessing, CTR mode
Pretty Good Privacy (PGP) 2nd 3rd 4th
     authentication 2nd
     compression
     confidentiality
     data compression
     e-mail compatibility
     key identifiers
     key rings
     keys and key rings, cryptographic 2nd
     messages, transmission and reception of 2nd
     notation
     operational description 2nd
     public-key management
     random number generation
     reassembly
     revoking public keys
     segmentation
     session key generation
     trust, use of
     use of
     ZIP, data compression using
Prime curve
Prime numbers 2nd
     determination of
     distribution of
     Miller-Rabin algorithm
     properties of
     testing for
Prime polynomial
Primitive root
Private key 2nd 3rd 4th
     encryption
     ring
     RSA, efficient operation using
     usage period
Proposal (P) payload 2nd
Protection profiles (PPs)
Protocols, authentication
Provable security, CTR mode
Pseudorandom function (PRF), TLS
Pseudorandom numbers 2nd 3rd 4th
     ANSI X9.17
     Blum Blum Shub (BBS) generator
     generators (PRNGs) 2nd 3rd 4th
     PGP, generation using
Public keys 2nd 3rd 4th 5th [See also Public-key cryptography, Public-key encryption]
     authority
     certificates
     cryptography
     directory of
     efficient operation of RSA using
     encryption 2nd 3rd 4th 5th
     management
     Pretty Good Privacy (PGP)
     public announcement of
     revoking
Public-key cryptography
     authentication protocols
     digital signal standard (DSS)
     digital signatures
Public-key encryption 2nd 3rd 4th 5th
     algorithm approaches 2nd
     cryptography
     cryptosystems 2nd
     Diffie-Hellman key exchange
     elliptic curve cryptography (ECC)
     key management
     message authentication
     number theory
     Oakley key determination protocol
     RSA algorithm 2nd
Public-key infrastructure (PKI)
     development of
     management functions
     management protocols
     X.509 (PKIX)
Public-key management 2nd
     approaches to, PGP
     cryptography for secret key distribution
     distribution
     Pretty Good Privacy (PGP)
     trust, use of
Public-key ring
Purchase request, SET




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net