User:Brnunes/Books/InfoSec 02


 * Symmetric-key algorithm
 * Key (cryptography)
 * Plaintext
 * Ciphertext
 * Shared secret
 * Cryptography
 * Stream cipher
 * Block cipher
 * Advanced Encryption Standard
 * Cryptographic primitive
 * Message authentication code
 * CBC-MAC
 * Non-repudiation
 * Hash function
 * One-way compression function
 * Feistel cipher
 * Known-plaintext attack
 * Chosen-plaintext attack
 * Differential cryptanalysis
 * Linear cryptanalysis
 * Cryptographically secure pseudorandom number generator
 * Initialization vector
 * Entropy (information theory)
 * Attack model
 * Cryptanalysis
 * Chosen-ciphertext attack
 * Adaptive chosen-ciphertext attack
 * Related-key attack
 * Data Encryption Standard
 * Ciphertext indistinguishability
 * Semantic security
 * Steganography
 * Caesar cipher
 * Substitution cipher
 * Vigenère cipher
 * ROT13
 * Frequency analysis
 * Brute-force attack
 * Ciphertext-only attack
 * Kasiski examination
 * Letter frequency
 * One-time pad
 * Information-theoretic security
 * Rotor machine
 * Cipher
 * Pseudorandomness
 * Keystream
 * Classical cipher
 * Stream cipher attack
 * Bit-flipping attack
 * Man-in-the-middle attack
 * Meet-in-the-middle attack
 * Space–time tradeoff
 * Product cipher
 * International Data Encryption Algorithm
 * Substitution–permutation network
 * Lai–Massey scheme
 * Block cipher mode of operation
 * Padding (cryptography)
 * Integral cryptanalysis
 * Format-preserving encryption
 * Authenticated encryption
 * Triple DES
 * S-box
 * Collision attack
 * Preimage attack
 * Birthday attack
 * Rainbow table
 * Distinguishing attack
 * Side channel attack
 * Length extension attack
 * Public-key cryptography
 * Diffie–Hellman key exchange
 * Digital Signature Algorithm
 * RSA (cryptosystem)
 * Password-authenticated key agreement
 * Paillier cryptosystem
 * Elliptic curve cryptography
 * ElGamal encryption
 * Pretty Good Privacy
 * Internet Key Exchange
 * GNU Privacy Guard
 * Key size
 * Web of trust
 * Public key infrastructure
 * Public key fingerprint
 * Optimal asymmetric encryption padding
 * Digital signature
 * Acoustic cryptanalysis
 * Computational complexity theory
 * Key management
 * Trapdoor function
 * Key exchange
 * Random number generation
 * Wiener's attack
 * Coppersmith's Attack
 * Shor's algorithm
 * Integer factorization records
 * RSA Factoring Challenge
 * Key generation
 * Digital signature forgery
 * Merkle–Damgård construction
 * MD5
 * Hash-based message authentication code
 * Strong cryptography
 * Birthday problem
 * Hash chain
 * Cryptographic hash function
 * Hash list
 * One-time password
 * Key stretching
 * Linked timestamping
 * Collision resistance
 * Comparison of cryptographic hash functions
 * Md5sum
 * HashClash
 * Certificate authority
 * Trusted third party
 * X.509
 * Simple public-key infrastructure
 * Comodo Group
 * History of cryptography
 * Outline of cryptography
 * Self-signed certificate
 * Certificate signing request
 * Revocation list