知道了这一点,假设攻击者构造了一条IC MP回应消息,它的头中包含伪造的任意主机a的源地址,如192.168.2.2。
Knowing this, imagine that an attacker constructs an ICMP echo message containing the spoofed source address of some arbitrary Host a, such as 192.168.2.2, in its header.
2008年4月,当弗兰克斯通知帕克,韦特海姆的结论是这些指纹是伪造时。帕克告诉她关于这幅画他有自己的消息:“我们两个星期前把它卖掉了。”
In April, 2008, when Franks informed Parker that Wertheim had concluded that the prints were forged, Parker told her that he had his own news about the painting: "we sold it about two weeks ago."
这种攻击和Rails验证储存在cookie中的消息摘要有关,这个缺陷允许一个攻击者来决定伪造签名能够在什么时候通过验证。
Such an attack is related to how Rails verifies message digests in the cookie store and might allow an attacker to determine when a forged signature is partially correct.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
Unauthorized access using techniques such as dictionary attack and falsified message.
如果验证过程并未提供相同的结果,则说明消息是伪造的,或者消息在传递途中曾被修改。
If the verification process does not provide the same result, then the message is either forged or has been tempered with en route.
这样就可以开始向空SOAP消息体里填充伪造的消息内容了,由于签名验证无误,那攻击者定义的任何一个操作都可以被有效地执行了。
The filling of the empty SOAP body with bogus content can now begin, as any of the operations denied by the attacker can be effectively executed due to the successful signature verification.
原始soap消息体元素会被转移到SOAP安全消息头的一个新添加的伪造包装器元素中。
The original SOAP body element is moved to a newly added bogus wrapper element in the SOAP security header.
该方案能受到替换公钥攻击,以至于任何人都能对任何消息成功伪造签名。
The certificateless signature scheme can suffer from public key replacement attack so that any one can forge a valid signature on any message.
该文认为该方案是全局可伪造的,群管理员可以对任何消息假冒任何成员生成有效的群签名。
This paper shows that Chen - Zhu's scheme is universally forgeable, that is, the group authority can forge a valid group signature on an arbitrary message, which stands in any group member.
新协议具有较高的安全性,能够满足节点身份的不可伪造性、消息完整性、前向安全性和会话密钥独立性等安全要求。
The new protocol enjoys many secure properties such as the reliability of the node's identity, the message integrity, the forward security and the session key independence.
在随机预言模型下,可证明该方案在适应性选择消息攻击下是存在不可伪造的。
It is proven to be existential unforgeable against chosen message attack under the random oracle model.
方案保证了签名效率和签名的强壮性,在随即预言模型下,证明了其在适应性选择消息攻击和身份攻击下都能抵抗存在伪造。
The proposed signature scheme ensures the efficiency and robustness of signature, and can defend existential forgery on adaptively chosen message and ID…
该文提出了一种伪造攻击方案指出张等的方案是不安全的,任一群成员在撤消中心的帮助下可以不利用自己的秘密参数对任何消息生成有效的群签名。
This paper will show that Zhang et al. 's scheme is insecure, any group member colludes with repeal center can generate a valid group signature without using his secret parameters.
该文提出了一种伪造攻击方案指出张等的方案是不安全的,任一群成员在撤消中心的帮助下可以不利用自己的秘密参数对任何消息生成有效的群签名。
This paper will show that Zhang et al. 's scheme is insecure, any group member colludes with repeal center can generate a valid group signature without using his secret parameters.
应用推荐