equivalent key attack algorithm 等效密钥攻击算法
Information Hiding Attack Algorithm 信息隐藏攻击算法
attack recognition algorithm 攻击识别算法
To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.
要实现攻击,攻击者需要先从使用MD 5算法签署证书的CA购买若干ssl证书。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
Experimental results show that, this algorithm is able to resist local cropping attack.
实验表明,该算法能够很好地抵抗局部剪切的攻击。
应用推荐