10.6. Terms and Concepts

computational complexity, 630reducibility, 639
NP-complete problems, 631Fermat's theorem, 641
satisfiability problem, 631confusion, 642
knapsack problem, 631diffusion, 642
clique problem, 632Data Encryption Standard (DES), 644
complexity class P, 633substitution, 645
complexity class NP, 633permutation, 645
nondeterministic Turing machine, 633expansion permutation, 645
inverse, 637S-box, 650
divisor, 637P-box, 650
prime number, 637weak DES key, 657
composite number, 637differential cryptanalysis, 658
greatest common divisor, 637Advanced Encryption System (AES), 660
Euclidean algorithm, 638 
modular arithmetic, 638substitute byte, 661
commutative ring, 639shift row, 662
Galois field, 639mix column, 662
associativity, 639add subkey, 662 ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.