To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.
要实现攻击,攻击者需要先从使用MD 5算法签署证书的CA购买若干ssl证书。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.
因此,有必要采用一种加密强度比较高的加密算法来加密一些重要数据,以防止合法用户的越权操作和非法用户的恶意攻击。
Experimental results show that, this algorithm is able to resist local cropping attack.
实验表明,该算法能够很好地抵抗局部剪切的攻击。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
图像水印的算法设计和攻击技术是互相促进的对立面。
It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.
同时,在借鉴国内外研究成果的基础上,探讨了攻击路径的自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。
Testing a bit more than a thousand values against the server may take few minutes, in which the victim session is likely to remain active. This is the outline of an attack algorithm.
对服务器测试几千个以上的值可能要花几分钟,在这段时间受害者就可能仍然活跃。
The Bayesian Optimization Algorithm (BOA) was introduced to tackle the coordination attack problem.
将贝叶斯优化算法(BOA)引入到协同攻击优化领域中。
Unfortunately, this is not a very secure hash function, it can be a dictionary attack to break algorithm similar to the command-line application!
不幸的是,这个哈希函数不是非常安全,它可以通过字典攻击算法被破解类似命令行应用程序!
Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of.
实验结果表明,改进后的算法对差分攻击的抵抗能力有所提高,雪崩效应更趋合理。
Experiment results show that this algorithm can restore distortion caused by global and local or no-linear geometrical attack, and it is practical and effective.
实验结果表明,该算法可以从全局和局部或非线性几何攻击中恢复失真,是实用和有效的。
Especially, the masking design in S-box of advanced encryption standard can make the algorithm safer to against linear attack.
特别对于高级加密标准算法的S盒设计,增加掩码设计可以加强抗线性攻击安全程度。
Experimental results show that the algorithm maintains the quality of the original image and is robust to non-geometric attack and loss compression.
实验表明,本算法较好地保持了原始图像的品质,对非几何攻击和有损压缩具有较好的稳健性。
Experimental results show that this algorithm has a good hiding effect and is robust for single attack and even collage attacks.
实验结果表明,该算法的隐藏效果很好,并且对单一攻击及多种复合攻击具有很好的鲁棒性。
Experiment verifies that this algorithm, depending on the foundation of not reducing the quality of video, can resist multiple disturbance and attack, and have good stability and robust.
实验证明,该视频数字水印算法在不降低视频质量的基础上,能够抵抗多种干扰和攻击,具有良好的稳定性和鲁棒性,并验证了以上分析。
Based on the description of the algorithm, experimental results and attack analysis are given.
在描述算法的基础上,给出了实验结果及攻击分析。
The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.
该算法显著地降低了快速相关攻击算法的译码复杂度。
The experimental results show that this algorithm possesses better invisibility and has good robustness to clipping, noise, filtering and JPEG compression attack.
实验结果表明该算法具有较好的不可见性,对剪切、噪声污染、滤波、JPEG压缩攻击具有良好的鲁棒性。
The analysis indicates that the encryption algorithm not only can effectively resist cipher-text-only attack but also chosen-plaintext attack.
分析表明,该文所设计的加密算法不但能抵抗唯密文攻击,而且能有效地抵抗选择明文攻击。
In this algorithm, an extended directed graph is used to show attack types and their relations, while the correlation is performed according to the method of forwards matching and absent matching.
算法采用有向图来表示攻击类别及其逻辑关系,按照前向匹配和缺项匹配的方式对报警进行关联。
The experimental results prove that this algorithm is invisible, robust against the attack of JPEG compression, noise and cut-and-paste attack.
实验结果证明该算法具有良好的不可见性,对JPEG压缩、噪声攻击和剪切攻击都有很好的鲁棒性。
A improved algorithm that builds security channel is provided, the new algorithm not only against known-plaintext attack, but also enhance efficiency of operation for encryption and decryption.
提出了一种改进的安全信道建立算法,新的算法能够承受已知明文攻击,同时还提高了加、解密运算的效率。
The process and algorithm of target distribution and attack sequence in multi target attacking are introduced, and the validity of the algorithm is proved by simulation.
介绍了多目标攻击的目标分配和攻击排序的过程与算法,并用仿真验证了该算法的有效性。
This paper analyzes current solutions and proposes a protocol to solve false destination sequence attack in AODV by introducing an algorithm of reputation rating updating.
该文针对AODV协议中的虚假目的序列号攻击以及已有解决方案中的缺陷,引入信誉值更新算法,设计一种基于AODV的入侵识别协议。
This paper analyzes current solutions and proposes a protocol to solve false destination sequence attack in AODV by introducing an algorithm of reputation rating updating.
该文针对AODV协议中的虚假目的序列号攻击以及已有解决方案中的缺陷,引入信誉值更新算法,设计一种基于AODV的入侵识别协议。
应用推荐