1) key compromise impersonation attack
密钥泄露伪装攻击
1.
Researches show that the protocol can not resist the key compromise impersonation attack.
研究结果发现,该协议不能抵抗密钥泄露伪装攻击。
2) partial key exposure attack
部分密钥泄露攻击
1.
In 1998, Boneh, Durfee and Frankel proposed the partial key exposure attack on RSA: for low encryption exponent RSA, given a quarter of the bits of the decryption exponent d,an adversary can recover the entire d when ν=1.
1998年,Boneh、Durfee和Frankel首先提出对RSA的部分密钥泄露攻击:当ν=1,e较小且d的低n/4比特已知时,存在关于n的多项式时间算法分解N。
3) key compromise attack
密钥泄漏攻击
1.
In this paper,we show that the scalable multicast key distribution protocol based on RSA,proposed by Molva,is insecure against key compromise attack and collusion attack.
分析了由Molva提出的一个可扩展的基于RSA的组播密钥分发协议,说明此协议对密钥泄漏攻击和共谋攻击是不安全的。
4) Key exposures
密钥泄露
5) password-compromise impersonation attack
口令泄露伪造攻击
6) secret key attacking
密钥攻击
补充资料:战役伪装(见伪装)
战役伪装(见伪装)
campaign camouflage
盆罢盘鉴,zhuQng.叹供脚衣气camPalgn camoutlage)见伪装。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条