- 1.1 Opinions, Products
- 1.2 Roadmap to the Book
- 1.3 Terminology
- 1.4 Notation
- 1.5 Cryptographically Protected Sessions
- 1.6 Active and Passive Attacks
- 1.7 Legal Issues
- 1.8 Some Network Basics
- 1.9 Names for Humans
- 1.10 Authentication and Authorization
- 1.11 Malware: Viruses, Worms, Trojan Horses
- 1.12 Security Gateway
- 1.13 Denial-of-Service (DoS) Attacks
- 1.14 NAT (Network Address Translation)
1.4 Notation
We use the symbol ⊕ (pronounced ex-or) for bitwise-exclusive-or. We use the symbol | for concatenation. We denote encryption with curly brackets followed by the key with which something was encrypted, as in {message}K, which means message is encrypted with K. We denote a signature with square brackets followed by the key, as in [message]Bob. Sometimes the key is a subscript, and sometimes not. There is no deep meaning to that. Honestly, it’s that sometimes we are using a key that has subscripts, such as KAlice, and the formatting tool we are using makes it very difficult to have a subscripted subscript.