21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

L<br />

length extension attacks, 252<br />

preventing, 269<br />

libcrypto, 315<br />

LibSafe, 83<br />

limitations, 84<br />

limiting risk with privilege separation, 20–23<br />

linear feedback shift registers, 570<br />

LION, 214–217<br />

little-endian vs. big-endian storage, 118<br />

LocalAlloc( ), 242, 247<br />

LockFile( ), 59<br />

LockFileEx( ), 59<br />

locking files, 57–59<br />

LookupAccountName( ), 14, 376<br />

LookupAccountSid( ), 377<br />

LookupPrivilegeValue( ), 15<br />

loopback address, 477<br />

LUID object type, 15<br />

LUID_AND_ATTRIBUTES structures, 15<br />

M<br />

MAC127, 261, 288–290<br />

MACs (Message Authentication<br />

Codes), 117, 249–253, 258–262<br />

algorithms, compared, 258–262<br />

creating your own, 300<br />

defined, 250<br />

dual-use modes, 259<br />

fastest software authentication, 287–290<br />

integrity checking, 274<br />

interfaces and memory allocation, 275<br />

limitations, 251<br />

monitoring log files using, 737<br />

OMAC block cipher-based<br />

MAC, 280–285<br />

parallelizing computation, 304<br />

properties, 259<br />

secure authentication, 303<br />

security recommendations, 275<br />

stream ciphers, converting to, 301<br />

support of multiple algorithms, 253<br />

use in securing channels, 492<br />

using smaller authentication tags, 298<br />

using smaller MAC tags, 298<br />

vs. message digests, 253<br />

mailslots, 477<br />

make_sockaddr( ), 477<br />

making encryption and message integrity<br />

work together, 298<br />

malicious data, handling via input<br />

validation, 71<br />

malicious HTML, 103<br />

malloc( )<br />

and BIGNUM objects, 316<br />

environment variables and, 4<br />

mandatory locks, 58<br />

man-in-the-middle attacks, 161, 310, 432,<br />

503<br />

Diffie-Hellman and DSA, 436<br />

prevention, 436<br />

manipulating big numbers, 315<br />

Matyas-Meyer-Oseas algorithm, 294<br />

MCF (Modular Crypt Format), 402<br />

encoding, 403<br />

McGraw, Gary, 79<br />

MD2 (Message Digest 2), 257<br />

MD4 and MD5, 257<br />

insecurity of, 255<br />

MD5 Modular Crypt Format (see<br />

MD5-MCF)<br />

MD5-MCF, 367<br />

password encryption using, 402–408<br />

verifying a password, 408<br />

MDC-2 algorithm, 257<br />

building a one-way hash from a block<br />

cipher, 294–298<br />

patent restrictions, 256<br />

MD-strengthening, 295<br />

memory<br />

C++, risks associated with, 704<br />

data, securely erasing from, 704–707<br />

volatile keyword, 704, 706<br />

dead-code elimination compiler<br />

optimization, risks from, 705<br />

neutralizing risks, 706<br />

memset( ), risks associated with, 705<br />

paging to disk, preventing, 707–709<br />

on Unix, 708<br />

on Windows, 708<br />

realloc( ), risks associated with, 704<br />

memory dumps, disabling during<br />

crashes, 35–37<br />

memset( ), 705<br />

use of memory, risks associated with, 705<br />

Mersenne Twister, 570<br />

message authentication, 249–306<br />

cryptographic primitives for, 250<br />

HMAC algorithm, 276–280<br />

message authentication codes (see MACs)<br />

message digests, 250<br />

block sizes of common functions, 271<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

Index | 749

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!