破解加密系统的人通常不按常理出牌。
The people who break cryptographic systems don't follow rules; they cheat.
然而,随着测量技术和分析技术的不断进步,出现了许多破解加密集成电路的攻击方法。
However, with the improvement of signal measurement and analysis technologies, cryptographic circuits are facing many kinds of attacking methods.
如果围绕某个函数的简单方向构造一个加密算法,那么想要破解加密的任何人都需要从相反的方向来解密。
If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.
简单来说,这些都属于其他加密标准,但由于现代计算机的强大性能,很快也被破解。
In short, it s another encryption standard that has fallen victim to modern computing power and can be cracked in no time at all.
当我们在线存储笔记时,加密密码并没有发送到网络上,从而排除他人通过网络来破解我们的笔记的危险。
The passphrase will never be sent to the web when we upload our notes to Evernote online storage. This will guarantee that the encrypted text can only be decrypted on our computer.
它无法阻止别人知道该数据的传输,因为加密数据可以被破解。
Well it doesn't prevent someone from knowing that data is being transmitted, as encrypted data can be intercepted and examined.
“盗版者有无限的时间和资源”Ishikawa说,“你无法建立一个不能被破解的加密技术。”
"Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
批评人士称,该公司既未充分保护自己的服务器,采用的数据加密算法又易遭破解。
Critics say that it did not protect its servers sufficiently and used algorithms to encrypt data that can be easily cracked.
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
本系统利用了PIC 12ce519内置的EEPROM来存放加密密钥字,极大的增加了软件被破解的难度。
The encryption system USES embedded EEPROM of PIC12CE519 to store the encryption key, and greatly enhances the difficulty of being cracked.
不过由于客户经常遭遇声音加密,因此Forttinet希望使IT安全人员可以在所有这些网络门户上拦截通话,然后对它们进行破解。
But clients are encountering voice encryption so much, Fortinet wants to allow it security personnel to intercept calls at these gateways and decrypt them.
根据Folhade S.Paulo报周五(25日)出版的报告所言,美国联邦警察历经一年的尝试,仍未破解硬盘的加密代码,只能于今年四月将硬盘归还巴西。
According to a report published on Friday (25) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. federal police returned the equipment to Brazil in April.
在备份的路由器配置文件中,密码即使是用加密的形式存放,密码明文仍存在被破解的可能。
In the backup router configuration file and password even if stored in encrypted form, password clear still exists the possibility of cracking.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
防读出:特殊内核MCU硬件加密结构+内部程序破解自损;
Read protection: The special kernel MCU hardware encryption structure + the self-destroying mechanism to be initiated if the internal programs are cracked.
求能破解WMA许可证的软件!最好能讲讲WMA的加密原理。
Seeking to crack the WMA license software! Better to talk about the principles of encryption WMA.
本文提出一种基于多模型的混合混沌系统,它具有加密速度快,密匙空间大,不容易破解的优点。
This paper offers a compound chaotic system based mutiple model used as sequence cipher, which has a high encryption speed, a large key space and is difficult to crack.
本课题以QQ游戏的客户端为例,分别采用动态分析和静态分析两种方式,成功地模拟了黑客破解游戏加密算法的全过程。
This paper USES QQ game Client as an example, it USES static analysis and dynamic analysis to simulate hackers' action to break the encryption arithmetic.
文章首次在国内公开论述了以USB闪存固件为加密载体的不可破解的CPK电子公章系统的设计思想;
A design about authentic CPK electronic seal system encrypted by USB Flash Memory Disk was given first time in this article.
一旦该密钥泄漏,整个系统就将崩溃,使得所有用此密钥加密的文件会被破解,而攻击者可利用此密钥肆意的签署任何文件,势必给密钥所有者造成非常严重的后果。
Once the key is leaked, the whole system would collapse and lead to the encrypted files decrypted and maliciously sign illegal files with the key by hackers which results in serious consequences.
这是因为数据已经被一种很可能无法破解的方式加密,对其加密的是世界上首台应用量子信息技术的设备。
This is because the data are being encrypted in a new and probably unbreakable way with one of the first practical devices to be developed for quantum information technology.
因为这种行为可以用来破解密码,因此采用了密码模式,它会依据先前区块加密回馈来修改加密程序。
Because this behavior can be used to crack a cipher, cipher modes are introduced that modify the encryption process based on feedback from earlier block encryptions.
论文主要讨论基于C8051F 320芯片的加密狗的设计,通过分析当前加密狗被破解的方法,设计出防跟踪分析的加密狗算法流程。
This paper mainly discusses a method for designing soft dog based on C8051F320, analyzes the method for cracking soft dog, and then designs the arithmetic flow that can prevent to be pursued.
加密时可以设置一个授权盘,这样,即使密码被别人知道了,但只要他没有授权盘,他仍然无法破解该文件。
Encryption can be authorized to set up a disk, so that even if people know the password, but as long as he did not authorize the plate, he still can not break it.
混沌加密通信系统具有很强的抗破解能力和长期不可预测等许多优点。
So the secure communication systems that apply the chaotic signal have strong anti-decryption and long unpredictability.
另一方面多媒体信息经过加密后容易引起攻击者的好奇和注意,并有被破解的可能性,而且一旦加密文件经过破解后其内容就完全透明了。
On the other hand assailants are attracted by multimedia information after encrypting , and its content is totally transparent once the cipher-text is decrypted.
要破解这个加密需要耗费大量的资源和时间。
Breaking the encryption would require extensive resources and time.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
应用推荐