21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

integrity checking<br />

cipher modes, 163<br />

messages, 274–276<br />

integrity validation, 649<br />

Intel conditionl branch instructions and their<br />

C comparison operators, 659<br />

interleaving MACs (Message Authentication<br />

Codes), 304<br />

interprocess communication using<br />

sockets, 475–482<br />

interprocess communications<br />

methods supported on different operating<br />

systems, 476<br />

sockets, using, 475–482<br />

ios::hex flag, 120<br />

IP addresses<br />

restricting access based on, 379–386<br />

spoofing, 379<br />

IsDebuggerPresent( ), 685<br />

IsDialogMessage( ), 635<br />

iteration counts, enhancing password<br />

security with, 141<br />

count size, 141<br />

IVs (initialization vectors), 135<br />

nonces, compared to, 135<br />

usage in CBC, 176<br />

J<br />

jail( ), 69<br />

job objects, 731<br />

K<br />

Kerberos, 370<br />

authentication using, 414–418<br />

encryption using, 470–475<br />

Heimdal and MIT implementations, 471<br />

padding, 474<br />

supported ciphers, 471<br />

key agreement, 307<br />

key agreement protocols, 367, 430<br />

key exchange<br />

Diffie-Hellman protocol, 432–436<br />

and DSA, 436<br />

and forward secrecy, 446<br />

securing against rollback attacks, 492<br />

key schedules, 172<br />

key transport protocols, 367<br />

key_len, 695<br />

key_offset, 695<br />

keys<br />

ASCII hexadecimal, conversion to<br />

binary, 121<br />

748 | Index<br />

authenticated exchange using<br />

RSA, 429–431<br />

binary keys, representing as<br />

hexadecimal, 120<br />

converting text keys to binary keys, 130<br />

cryptographic algorithms, representing for<br />

usage in, 117<br />

exchange keys, 245<br />

generating short-term keys from a<br />

long-term key, 142<br />

length, 160–162<br />

minimum effective, 161<br />

length and security, 313<br />

management, 149<br />

for message queues, 476<br />

public keys, binary<br />

representation, 352–355<br />

public keys, recommended lengths, 313<br />

random symmetric, generating, 119<br />

representation<br />

as English text, 128<br />

in plaintext (PEM encoding), 355–361<br />

public keys vs. symmetric keys, 118<br />

RSA<br />

decryption using private<br />

keys, 336–337<br />

encryption using public keys, 332–336<br />

key pairs, generating, 327–329<br />

signature verification with public<br />

keys, 340–343<br />

used in digital signatures, 338–340<br />

secure management, 149<br />

session keys, providing forward secrecy<br />

while using, 444<br />

signed data types and, 118<br />

symmetric key-length, choosing, 119<br />

third-party validation, 344, 438<br />

variable key sizes, OpenSSL<br />

supported, 226<br />

(see also cryptography)<br />

keystreams, 165<br />

parallelizing generation of, 208–211<br />

precomputing in cipher modes or stream<br />

ciphers, 207<br />

Kohno, Tadayoshi, 168<br />

Kosiur, Dave, 491<br />

Krawczyk, Pawel, 664<br />

krb5_auth_con_getremotesubkey( ), 471<br />

KRB5_GENERAL_ _ preprocessor<br />

macro, 472<br />

krb5_recvauth( ), 417<br />

krb_auth_con_getremotesubkey( ), 471<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!