Index
As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.
A
abelian group, 272
properties, 273
active attack
versus passive attack, 905
adaptive chosen-ciphertext attack, 969
adaptive chosen-plaintext attack, 964
Advanced Encryption Standard (AES), 96, 209, 770
AES block cipher, 779
selection criteria, 780
structure, 781, 782
AES-GCM Authenticated Cipher, 869, 871, 873
alert protocol, 227
American National Standards Institute (ANSI), 541
anomalous elliptic curves, 448
anonymous key exchange, 170
application traffic keys, 668
application_data, 231
asymptotic approach, 134, 136
attacker model, 42
attacks example, 26
commonalities, 38, 40
Jeep hack, 34, 36
Mirai botnet, 27, 30
Operation Aurora, 31
authenticated cipher algorithm, 847
authenticated encryption with associated data (AEAD) algorithm, 848, 851
predictability with nonces, avoiding, 852
authenticated decryption with CCM,...