[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
C++ language buffer overflows and
exception handling
use of memory, risks associated with
C language buffer overflows and
exception handling
canary
capture replay attacks, preventing
CAs (certification authorities)
2nd
3rd
root certificates fingerprints and
obtaining
obtaining and checking
CAST5, supported key sizes
CBC (Cipher Block Chaining) mode
2nd
block cipher setup, OpenSSL
calculating message output length
high-level API
incremental decryption
incremental encryption
PKCS #11 compliance
incremental initialization
padding
OpenSSL, disabling in
switching off
parallelization issues
SPC_CBC_CTX data type
cbc_set_padding( )
CCM (CTR plus CBC-MAC) mode
precomputing keystream for
CERT_CONTEXT objects
CertEnumCertificatesInStore( )
CertFreeCertificateContext( )
CertFreeCRLContext( )
CertGetIssuerCertificateFromStore( )
CertGetNameStringW( )
Certicom
Certificate Management Library
certificate revocation
certificate revocation lists
[See CRLs] certificates
2nd
binary representation
certificate hierarchies
2nd
certificate revocation lists
[See CRLs] certificate signing requests (CSRs)
code-signing certificates
obtaining
personal certificates
precedence of fields
purposes
representing in plaintext (PEM encoding)
self-signed certificates
term of validity
trusted list, adding to
verification
adding hostname checking to
against whitelists
web site certificates
X.509 certificates
[See X.509 certificates] certification authorities
[See CAs] CertOpenSystemStore( )
CFB (Cipher Feedback) mode
2nd
block cipher setup, OpenSSL
block size
high-level API
initialization
parallelization issues
PKCS #11 compliance
SPC_CFB_CTX data type
cfb_decrypt_update( )
cfmakeraw( )
CGI scripts, environment variables used by
chain responders
Chandra, Pravir
check_spoofdns( )
checking message integrity
checksum algorithms, using for software protection
Chen, Hao
child processes, creating securely
chroot( )
2nd
jail( ), compared to
cipher instantiation reference
ciphers
configurable key lengths
modes
2nd
parallelization of encryption and decryption
selecting
padding adding and checking
disabling in OpenSSL in CBC mode
variable key length, usage in OpenSSL
ciphertext stealing (CTS) mode
Class 1 Digital ID
clock cycles, counting
clock( )
CMAC
2nd
cmac_cleanup( )
cmac_final( )
cmac_mac( )
cmac_update( )
code_len
code_offset
collision attacks
collision resistance and one-wayness
command-line arguments, environment variables as separators
confirming requests via email
converting binary strings to integers for use with RSA
integers to binary strings for use with RSA
text keys to binary keys
Cookie headers
cookie theft
cookies
authentication using
core dumps, security aspects
cpuid instruction
Crack
CrackLib
CRAM (Challenge-Response Authentication Mechanism)
crashes, disabling memory dumps during
CRC32 algorithm
crc32_calc( )
CreateDialog( )
progress bar control, need for
CreateJobObject( )
CreateMutex( )
CreateProcess( )
CreateProcessAsUser( )
2nd
3rd
CreateRestrictedToken( )
creating files for temporary use
cRLDistributionPoints extensions
2nd
CRLs (certificate revocation lists)
2nd
CryptoAPI, obtaining with
OpenSSL, obtaining with
HTTP client for server connection
cross-site scripting attacks
2nd
JavaScript code injection
preventing
crypt( )
password-based authentication using
CRYPT_VERIFYCONTEXT flag
CryptAcquireContext( )
2nd
3rd
CryptCreateHash( )
2nd
CryptDecrypt( )
CryptDeriveKey( )
2nd
CryptDestroyHash( )
CryptDestroyKey( )
CryptEncrypt( )
CryptExportKey( )
2nd
CryptGenKey( )
CryptGenRandom( )
2nd
CryptGetHashParam( )
CryptGetUserKey( )
2nd
CryptHashCertificate( )
CryptHashData( )
CryptImportKey( )
2nd
CryptoAPI
certificate stores
CRLs, obtaining with
design features
extracting raw key data from key objects
key object creation with raw key data
MAC implementations
message authentication via HMAC
public key cryptography issues
symmetric encryption using
X.509 certificate verification using
CryptoExportKey( )
cryptographic hash algorithms
cryptographic hash functions
algorithms
properties
collision resistance and one-wayness
desirable characteristics
patents
PRNGs, using as
whitening, using for
cryptographic hashes
cryptographic primitives, timing
Cryptographic Service Providers
[See CSPs] cryptography
[See also symmetric cryptography] algorithms, comparing
CPU clock speed and
elliptic curve cryptography
keys
random symmetric, generating
representation, public vs. symmetric
machines, comparing
one-time values
public key
[See public key cryptography] symmetric primitives
CryptReleaseContext( )
CryptSetHashParam( )
CryptSetKeyParam( )
CSPs (Cryptographic Service Providers)
2nd
supported symmetric ciphers
CSS
[See cross-site scripting attacks] CTR (counter) mode
2nd
high-level API
MACs, conversion into stream ciphers using
nonce
PKCS #11 compliance
precomputing keystream for
SPC_CTR_CTX data type
CTS (ciphertext stealing) mode
current_stamp( )
entropy gathering, using for
CWC (Carter-Wegman + CTR) mode
2nd
Brian GladmanÕs implementation
in a high-level encryption and decryption API
local_options.h file
precomputing keystream for
cwc_cleanup( )
cwc_decrypt_message( )
2nd
cwc_encrypt_message( )
cwc_init( )
|