21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EGD (Entropy Gathering Daemon), 594–599<br />

commands, 594<br />

risks as an entropy source, 595<br />

socket directory, 596<br />

ELF-based Unix and environment<br />

variables, 3<br />

elf_get_entry( ), 697<br />

elliptic curve cryptography, 308<br />

licensing, 312<br />

email<br />

addresses, validating, 101–102<br />

confirming requests via, 447–453<br />

lexical rules, validation against, 101<br />

email, certificates for use in, 514<br />

EME-OAEP padding, 333–336<br />

ENCMAP data type, 148<br />

encryption<br />

in a single reduced character set, 146<br />

Kerberos, using, 470–475<br />

message integrity and, 298<br />

parallelizing in modes that allow<br />

it, 208–211<br />

using hash functions, 301–303<br />

encryption algorithms<br />

choosing, 156–160<br />

supporting multiple, 155<br />

“Encryption Queue” implementation of<br />

CWC, 217–221<br />

encrypt-then-authenticate paradigm, 299<br />

encrypt_within_charset( ), 148<br />

endianess, 118<br />

endpwent( ), 373<br />

Enhanced SNACC ASN.1 compiler,<br />

source, 353<br />

entropy, 570<br />

adding, reasons for, 592<br />

collection tips, 572<br />

compression of entropy-containing<br />

data, 593<br />

determining required quantity, 571<br />

EGADS (Entropy Gathering and<br />

Distribution System),<br />

using, 599–603<br />

EGD and compatible third-party<br />

tools, 594–599<br />

entropy harvesters, 569<br />

estimation and management, 621–629<br />

attacks on entropy sources, 622<br />

disk access, entropy in, 628<br />

insecurity of boot time as entropy<br />

source, 621<br />

key presses, entropy in, 627<br />

mouse events, entropy in, 627<br />

network data, entropy in, 628<br />

sound devices, entropy in, 629<br />

thread timing and system state,<br />

entropy in, 629<br />

threat models, 621–625<br />

timestamps, entropy in, 625–627<br />

Unix systems, observable entropy, 622<br />

fractional bits, 571<br />

generic API for, 573<br />

getting at startup, 614<br />

key length and, 569<br />

keyboards, gathering from, 630–637<br />

Unix, 631–633<br />

Windows, 634–637<br />

mouse events, gathering from in<br />

Windows, 638–643<br />

system state, gathering from, 644<br />

thread timings, gathering from, 643<br />

Unix tools for generating, 575–579<br />

usefulness, 569<br />

whitening, 571<br />

Entropy Gathering and Distribution System<br />

(see EGADS)<br />

Entropy Gathering Daemon (see EGD)<br />

ENTROPY_PER_SAMPLE macro, 631<br />

enveloping interfaces, 333<br />

environ global variable (C language), 2<br />

environment validation, 648<br />

environment variables<br />

CGI scripts, used by, 5<br />

deleting, 95<br />

inheritance, 92<br />

obtaining, 92<br />

protecting from exploitation, 1–7<br />

secure usage, 92–97<br />

TZ (time zone), 4<br />

Unix and Windows dependencies, 2<br />

value, changing, 93<br />

ephemeral Diffie-Hellman, 436<br />

ephemeral keying, 446<br />

equals (=), base64 padding character, 124<br />

erasing files securely, 47<br />

error handling, 700–704<br />

evaluating URL encodings, 99<br />

event-driven systems and shatter attacks, 717<br />

EVP_CIPHER_CTX_cipher( ), 230<br />

EVP_CIPHER_CTX_ctrl( ), 229<br />

EVP_CIPHER_CTX_init( ), 222<br />

EVP_CIPHER_CTX_mode( ), 230<br />

EVP_CIPHER_CTX_set_key_length( ), 226,<br />

227<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

Index | 745

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!