21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

oot certificates, 519–522<br />

CAs, list, 520–522<br />

obtaining and checking, 519<br />

validating, 520<br />

Root Report, 519<br />

RSA algorithm, 142, 312<br />

authenticated key exchange, 429–431<br />

MACs, usage, 431<br />

complexity of implementation, 333<br />

converting binary strings to integers for<br />

use with, 330<br />

converting integers to binary strings, 331<br />

DER-encoding of public keys, 353<br />

dictionary attacks and, 335<br />

EME-OAEP padding, 333–336<br />

generating key pairs, 327–329<br />

and man-in-the-middle attacks, 333<br />

padding and, 333<br />

private keys, decryption using, 336–337<br />

private keys, signing with, 338–340<br />

public keys, encryption using, 332–336<br />

raw decryption using a private<br />

key, 336–337<br />

raw encryption with a public<br />

key, 332–336<br />

recommended key lengths, 313<br />

secure signing and encryption, 343<br />

signature verification with public<br />

keys, 340–343<br />

symmetric encryption, usage in<br />

implementations, 333<br />

RSA_blinding_on( ), 341<br />

RSA_generate_key( ), 327<br />

RSA_private_decrypt( ), 337<br />

RSA_public_encrypt( ), 332, 334, 335<br />

RSA_sign( ), 339<br />

RSA_size( ), 333<br />

RSASSA-PKCS1v1.5 signing standard, 338<br />

RSASSA-PSS digital signing standard, 338<br />

RtlSecureMemory( ), 707<br />

S<br />

SACL (system access control list), 41<br />

safe primes, 318, 323<br />

SafeStr library, 82, 85–88<br />

functions and C equivalents, 86<br />

SAFESTR_ALLOC( ), 86<br />

SAFESTR_CREATE( ), 86<br />

safestr_free( ), 87<br />

safestr_istrusted( ), 88<br />

safestr_reference( ), 87<br />

safestr_release( ), 87<br />

safestr_t type, 85<br />

SAFESTR_TEMP( ), 86<br />

SAFESTR_TEMP_TRUSTED( ), 88<br />

salt, 133<br />

dictionary attacks, prevention with, 141<br />

hardening hash functions against birthday<br />

attacks, 270<br />

sanitizing the environment, 1–7<br />

SASL (Simple Authentication and Security<br />

Layer), 364<br />

saved user and group IDs, 17<br />

SAX (Symmetric Authenticated<br />

eXchange), 369, 422–429<br />

client side, 427–429<br />

server-side, 423–427<br />

Schneier, Bruce, 116<br />

secure programming, 71<br />

web sites, xviii<br />

secure server certificates, 517<br />

securely creating child processes, 26–28<br />

securely signing and encrypting with<br />

RSA, 343<br />

SecureZeroMemory( ), 707<br />

security<br />

authentication mechanisms,<br />

requirements, 365<br />

bit size of algorithms, 313<br />

function errors and, 700<br />

initialization and, 1<br />

weak vs. strong passwords, 391<br />

security identifiers (see SIDs)<br />

Security Support Provider Interface<br />

(SSPI), 454<br />

seeds, random numbers, 568<br />

select( )<br />

preventing file descriptor<br />

overflows, 112–115<br />

typical usage, 112<br />

selecting a cipher mode, 162–171<br />

selecting a public key algorithm, 311<br />

selecting public key sizes, 312–314<br />

self-signed certificates, 511<br />

sequential nonces vs. random nonces, 134<br />

Serpent, 158, 159<br />

home page, 160<br />

servers<br />

authentication without<br />

third-party, 438–444<br />

for network logging, 734<br />

SSL servers, creating, 457–460<br />

SSL servers, improving efficiency with<br />

caching, 460–463<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

Index | 755

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!