密码分析中的一组三个连续字母。
快速相关攻击是一种重要的序列密码分析方法。
Fast correlation attack is one of the important cryptanalysis method for stream ciphers.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
分别对两种对称混沌密码系统进行了密码分析。
Cryptanalysis of two different kinds of symmetric chaotic cryptosystems is presented.
密码分析:对密码书写或密码系统的分析和译解。
Cryptanalysis: The analysis and deciphering of cryptographic writings or systems.
包含加密技术和密码分析(学)两部分的学科领域。
The field that encompasses both cryptography and cryptanalysis.
对基于此种新轮函数的一种迭代型分组密码进行了差分密码分析。
A differential cryptanalysis of the iterated block cipher based on the new round function is presented.
这就只剩下了一个文件,只包含对彼此异或两个原始文件密码分析。
This leaves the cryptanalyst with a file that contains only the two original files XORed against each other.
研究AES- 256抵抗相关密钥-不可能差分密码分析的能力。
In this paper, the strength of AES-256 against the related-key impossible differential attack is examined.
整体而言,安全与秘密通讯的学科包括密码法与密码分析,称为密码学。
Collectively, the science of secure and secret communications, involving Both cryptography and cryptanalysis, is known as cryptology.
为达到完美向前和完美向后保密以及对付密码分析,需要更新组会话密钥。
In order to achieve perfect forward and perfect backward secrecy, and to counteract cryptoanalysis, the group session keys should be rekeyed.
本文把序贯概率比检验引入到密码分析中,用来约减相关攻击所需的密钥量。
In this paper, the Sequential Probability Ratio Test (SPRT) is introduced to cryptanalysis to reduce the amount of keys needed in correlation attacks.
同时理论和实验表明,该算法具有较高的安全性,能够抵抗差分和线性密码分析。
At the same time, the results of the security analyses indicate that the algorithm can against the differential and linear at - tacks and with high security.
以SAFER++为例,通过基础模块的密码特性分析,建立密码分析的线性逼近式。
With the case of SAFER + + as an example, the special linear approximations were obtained by analyzing the basic modules.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
最大公因子计算是计算数论的基础课题之一,它在密码算法和密码分析中有着非常广泛的应用。
Greatest Common Divisor is one of the basic subjects in computational number theory, it has a wide application in encryption and analysis of cryptography.
论文介绍了一种基于全非奇异矩阵的代替置换网络,它可有效的提高分组密码抗线性密码分析的能力。
This paper introduces a completely nonsingular matrix based substitution permutation network that can effectively improve the performance of the block cipher against linear cryptanalysis.
指出了使用大规模的基于全奇异矩阵的代替置换网络可有效地提高分组密码抗差分密码分析的安全性。
Therefore, using large completely nonsingular matrix based substitution permutation networks can effectively improve cipher security in relation to differential cryptanalysis.
AC分组密码的设计结合了宽轨迹策略和比特块技术,以确保算法对差分密码分析和线性密码分析的安全性。
The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis.
在这些袭击中,如果知道密码分析的文件类型,那么他可以使用头格式的知识来猜测用于编码文件的密钥流。
In these attacks, if the cryptanalyst knows the file type, then he can use knowledge of header formats to guess at the key stream used to encode the file.
多重线性密码分析是线性密码分析方法的一种推广,如何利用多重线性密码分析方法来攻击DES一直是人们关注的焦点。
Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
如果密码分析认为,在用户使用相同的密钥来加密两个不同的文件,他可以异或两个文件一起,并取消了从PRNG输出。
If a cryptanalyst thinks that a user has used the same key to encrypt two different files, he can XOR the two files together and cancel out the output from the PRNG.
对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。
Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks.
在64位的精度下,即使初始密钥中的一个变量有10 - 15的微小差异,密码分析者也根本无法得到原始明文的任何有关信息。
At the precision of 64 bits, even if a variable in the initial key has a minute difference about 10-15, any information about the original plaintext can't be obtained.
以明文方式传输消息、传输加密的但以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后对消息进行解密,在以上几种情况下都可能发生这种攻击。
This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.
本设计的实现不但为其理论研究提供了一种手段,而且为密码分析提供了实践上的应用,既可以进行破译分析也可以作为一个密码分析的(辅助)工具。
Realizing this design provide not only one way for studying in theory. but also application for cryptanalysis in practice, it can analyse cipher and be regarded as a (assistant) tool of cryptanalysis.
然后,攻击者能够通过分析记录数据检索出凭证信息,比如说密码和凭证信息。
The attacker can then analyze the recorded data to retrieve confidential information, such as passwords and confidential messages.
现在,仅需对敲击键盘的音频记录作一个简单的分析,计算机科学家们便能精确地重现被键入的文本信息——包括密码。
Simply by analysing audio recordings of keyboard clatter, computer scientists can now reconstruct an accurate transcript of what was typed-including passwords.
现在,仅需对敲击键盘的音频记录作一个简单的分析,计算机科学家们便能精确地重现被键入的文本信息——包括密码。
Simply by analysing audio recordings of keyboard clatter, computer scientists can now reconstruct an accurate transcript of what was typed-including passwords.
应用推荐