Index

NC1, see Nick's Class

images(·), 310

π(·), 310

eth roots assumption, 314

gcd(·,·), 310

1963 virus, 175

3DES, see symmetric cipher, 3DES

activity monitor, 186

adaptive attacks

chosen-ciphertext, 53, 80, 328, 340

chosen-message, 329, 343

chosen-plaintext, 327

AES, see symmetric cipher, AES

algorithmic combinatorics, 53

all-or-nothing disclosure, 137

ambivalent root, 166, 248, 256

Anderson Report, 190, 202

anonymous remailer, 45, 90

ANSI C, 232

ARDA, 77

assassination politics, 92, 93, 97

asymmetric cryptography, 39

asymmetric cryptosystem, 326

AT&T, 34

authentication systems, 35

battleprogs, 17

bias matching, heuristic, 60

biased coin, 52, 57

Big-O notation, 309

Binomial Theorem, 110

black-box cryptosystem, 231

Blowfish, see symmetric cipher, Blowfish

Blum integer, 330

busy-waiting, 53

call graph, 193

call-back function, 34

Capstone, 230

card shuffling, 71

Carmichael lambda function, 310

cascading encryptions, 290

CERT, 21, 348

certificate of recoverability, 227

certificate revocation list, see CRL

certification authority, 225, 227, 259, 292, 337

CFB, see cipher feed-back

chaotic air-turbulence, 54

checksum, 18, 30, 46, 135, 330

Chernoff bounds, 232

Chinese Remainder Theorem, 111, 331, 336

chosen-ciphertext attack, 327, 331

chosen-message attack, 329

chosen-plaintext attack, 327, 331

cipher feed-back, 46

ciphertext-only attack, 326

circularly linked list, 21, 100, 133

Clipper chip, ...

Get Malicious Cryptography: Exposing Cryptovirology now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.