旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
多重线性密码分析是线性密码分析方法的一种推广,如何利用多重线性密码分析方法来攻击DES一直是人们关注的焦点。
Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
最简单最基本的方法是,使用统计分析技术执行隐写式密码解密。
In its simplest and most basic form, steganalysis is performed through the use of statistical analysis techniques.
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
RUC模型和RCA模型为可重构密码处理结构的研究提供了基本的参考结构、分析方法和设计准则。
RCA and RUC provide a structural sketch, analysis methods and design rules for the research of reconfigurable cipher processing architecture.
人们提出了多种密码协议的分析方法,BAN类逻辑是其中重要的一种。
There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.
论文第四章重点介绍用非线性映射方法分析原核生物基因密码子使用情况并得到的相关结论。
In chapter IV, the codon usage preferences in prokaryotic organism are analyzed by nonlinear mapping method.
通过对黑客软件获取密码的原理及一般工作方法的分析,提出了一种保护密码的方法,对于加强网络安全具有一定的借鉴意义。
Password protection method was presented to strengthen the network security by analyzing the principle on hacker's detecting password and its common working methods.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
乱序执行是密码芯片设计中一种低冗余、低功耗的抵抗功耗分析攻击的方法。
The random order execution which used in cryptographic ICs is a kind of few redundancy and low power countermeasures against power analysis attacks.
SPN结构是一种流行的分组密码总体结构;差分和线性分析是攻击分组密码的最强有力的方法。
SPN is a popular overall structure of block cipher, and the differential cryptanalysis and linear cryptanalysis are the most powerful approaches to attack most symmetric block ciphers.
差分功率分析(DPA)方法可有效地对加密的集成电路芯片进行攻击解密,它绕过了加解密算法繁琐的数学分析,从而获取密码和信息。
The method of DPA may attack on encrypted FPGA effectively, which does not need complex analysis to encryption arithmetic and obtains ciphertext and information.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
基于网络的数据传输安全问题是信息安全领域的重要课题之一,本文在分析现有数据加密方法的基础上,在数据传输系统中应用一种基于分组密码新概念的新算法—排列码加密算法。
In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.
对开放性互联网络的网络安全进行了介绍,对公钥密码体制和OSI的网络安全体系结构进行了详细的分析,并找出存在问题及解决方法。
This paper introduces the security of interconnection network. The open cipher and OSI network security structure are analysed. The existing problems are discussed and solved.
给出了差分序列的若干性质,对差分分析方法在序列密码中的应用作了一些探讨,并给出了攻击实例。
In this paper, we point out some properties of the differential sequence, discuss the applications of differential cryptanalysis in sequence cipher attack and provide an attack sample.
串空间理论是一种新兴的用于密码协议形式化分析的方法。
Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.
方法基于对公钥密码体制的分析,研究RSA密码体制的实现算法,设计系统程序模块。
Methods Based on the Analyzing of public key cryptosystem, a practical algorithm of RSA is studied, and programmer model is designed.
分析了病毒对文件完整性的破坏,对此提出了使用公钥密码体制进行数字签名来保护文件完整性的方法。
The destruction of the integrity of executable files by virus is discussed and the conceptof integrity information of executable files is proposed.
计算了基于拟氨基酸编码方法下的同义密码子的相对使用度,分析了78个人类基因(19967个密码子)中基于拟氨基酸编码方法下的同义密码子的偏好使用情况。
The relative usage degree of the synonymous codon is computed and the use of preferences of the synonymous codon in 78 human genes (19967 codons) is analysed based on the quasi-amino acids coding.
提出根据莫尔理论制作隐型全息密码的方法,对此方法作了理论分析并给出实验结果。
A study on concealed codes using moire method is presented. The theoretical analysis and experimental results are given.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
本文扩展了串空间模型及其认证测试方法,增强了其对丰富密码学中一些复杂操作的分析和描述能力。
This dissertation extends the strand space model and its authentication test, which can enhance the analyses and description of some cryptographic primitives rich in cryptographic primitives.
其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;
The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.
其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;
The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.
应用推荐