21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

symmetric cryptography, 116–154<br />

algorithms, 155–248<br />

choosing, 156–160<br />

noncommercial, patent-free<br />

implementations, 159<br />

speed, 158<br />

supporting multiple, 155<br />

cipher modes, 157<br />

CBC (Cipher Block Chaining), 164,<br />

175–186<br />

CCM (CTR plus CBC-MAC)<br />

mode, 170<br />

CFB (Cipher Feedback) mode, 167,<br />

186–192<br />

CTR (counter), 165, 197–202<br />

CWC (Carter-Wegman + CTR), 168,<br />

202–205<br />

ECB (Electronic Code Book), 164,<br />

171–175<br />

OCB (Offset Codebook) mode, 169<br />

OFB (Output Feedback) mode, 166,<br />

192–196<br />

selecting, 162–171<br />

CryptoAPI key objects, creating from<br />

symmetric keys, 244–246<br />

keys<br />

extraction from CryptoAPI key<br />

objects, 246–248<br />

generating from one secret, 142<br />

length, 160–162<br />

length of configurable ciphers, 160<br />

length of public keys, compared<br />

to, 161<br />

passwords, conversion to, 136–142<br />

providing forward secrecy, 444<br />

random data, effective usage, 161<br />

shared secrets, 116<br />

stream ciphers, 146<br />

symmetric encryption algorithms, 117<br />

symmetric primitives, 117<br />

synchronization of resource access, 60–63<br />

across processes<br />

Windows, 63<br />

Unix, 60–63<br />

syslog( ), 75<br />

syslog utility, 734<br />

syslog-ng, 735<br />

system( ), risks of, 30<br />

system access control list (SACL), 41<br />

760 | Index<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

T<br />

tags, 250<br />

tags (integrity values), 274<br />

testing the strength of passwords, 391<br />

test_routine( ), 658, 697<br />

text keys, converting to binary, 130<br />

threads<br />

denial of service attacks using, 718<br />

guarding against spawning too<br />

many, 718–723<br />

thread pools, 718<br />

throw keyword, 701<br />

Time of Check, Time of Use (TOCTOU), 43<br />

times( ) function (POSIX), 153<br />

timing attacks, 337<br />

timing cryptographic primitives, 150–154<br />

clock cycles, counting, 151<br />

timing cryptographic code, 154<br />

TLS (Transport Layer Security), 371<br />

TMAC, 281<br />

TOCTOU (Time of Check, Time of Use), 43<br />

tokens, 7<br />

SID lists, 8<br />

Triple-DES (3DES), 157, 159<br />

key length, 158<br />

Tromer, Eran, 314<br />

try-catch blocks, 701<br />

tunnels, 468–470<br />

TZ environment variable, 4<br />

U<br />

UMAC32, 261<br />

umasks, 55–57<br />

universal hash functions, 250<br />

Unix, 60–63, 97<br />

access control, 38–41<br />

restricting for new files, 55<br />

creating temporary files, 66<br />

crypt( ), 367<br />

cryptographic algorithms, timing on, 153<br />

debuggers and ptrace, 683<br />

domain sockets, authentication<br />

using, 482–485<br />

operating systems, differences<br />

among, 482<br />

entropy gathering<br />

from keyboards, 631–633<br />

from system state, 644<br />

from threads, 643<br />

entropy, observable on, 622

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!