[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
Kerberos
authentication using
encryption using
Heimdal and MIT implementations
padding
supported ciphers
key agreement
key agreement protocols
2nd
key exchange Diffie-Hellman protocol
and DSA
and forward secrecy
securing against rollback attacks
key schedules
key transport protocols
key_len
key_offset
keys
[See also cryptography] ASCII hexadecimal, conversion to binary
authenticated exchange using RSA
binary keys, representing as hexadecimal
converting text keys to binary keys
cryptographic algorithms, representing for usage in
exchange keys
generating short-term keys from a long-term key
length
minimum effective
length and security
management
for message queues
public keys, binary representation
public keys, recommended lengths
random symmetric, generating
2nd
representation as English text
in plaintext (PEM encoding)
public keys vs. symmetric keys
RSA decryption using private keys
encryption using public keys
key pairs, generating
signature verification with public keys
used in digital signatures
secure management
session keys, providing forward secrecy while using
signed data types and
symmetric key-length, choosing
third-party validation
2nd
variable key sizes, OpenSSL supported
keystreams
parallelizing generation of
precomputing in cipher modes or stream ciphers
Kohno, Tadayoshi
Kosiur, Dave
Krawczyk, Pawel
krb_auth_con_getremotesubkey( )
krb5_auth_con_getremotesubkey( )
KRB5_GENERAL_ _ preprocessor macro
krb5_recvauth( )
|