1) Replacement attack
替代攻击
2) Key Replacement Attack
密钥代替攻击
3) substitution attack
替换攻击
1.
Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities P I and P S of a successful impersonation attack and a successful substitution attack, respectively, of this code are also computed.
计算了认证码的参数 ,并在假定按照等概率分布来选择编码规则下 ,计算了成功模仿攻击概率PI 和成功替换攻击概率PS,它们都达到了最优或接近最优 ,为实现一些好的实用认证技术在理论上提供了可靠的基础 ,也给出了构造Cartesian认证码的技巧 。
2.
On assuming that encoding rules are chosen according to a uniform probability distribution,the probabilities of a successful impersonation attack and a successful substitution attack of these codes are also computed respectively.
并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率。
3.
Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities P I and P S of a successful impersonation attack and a successful substitution attack, respectively, of this code are computed.
计算了认证码的参数 ,并假定按照等概率分布选择编码规则 ,计算了成功模仿攻击概率PI 和成功替换攻击概率PS,它们都达到了最优或接近最优 。
4) algebraic attacks
代数攻击
1.
Review of algebraic attacks on stream ciphers;
流密码代数攻击的研究现状及其展望
2.
Algebraic Attacks on Symmetric Ciphers and the Study of Algorithms for Solving Systems of Multivariate Equations;
对对称密码的代数攻击及解多元方程组算法的研究
3.
A simple description is given to the basic theory of algebraic attacks on stream ciphers and the type of stream ciphers that can be attacked.
文章描述了代数攻击的一般原理和可攻击的流密码类型,针对带记忆非线性组合流密码的代数攻击,基于Courtios等人的工作,给出了一种新的寻找可用于代数攻击的低阶多元方程的方法。
5) delegation attack
代理攻击
1.
Efficient universal designated verifier signature against delegation attack;
高效抵抗代理攻击的广义指定验证者签名
6) algebraic attack
代数攻击
1.
A Research of Algebraic Attacks Method on Advanced Encryption Standard;
高级数据加密标准的代数攻击方法研究
2.
This paper introduces a new efficient algebraic attack based on Grobner basis,describes Rijndael encryption by an extremely sparse overdefined multivariate quadratic system over GF(2),and converts degree reverse lexicographic order into lexicographic order with conversion algorithm FGLM.
代数攻击能够有效分析出分组密码中的密钥值,Grobner基能够快速求解多变量高次方程组。
3.
Annihilators of cryptographic Boolean functions have been shown to be closely related to algebraic attacks to stream ciphers.
布尔函数的零化子与代数攻击息息相关,但是如何构造一个给定函数的低次零化子仍然是一个悬而未决的问题。
补充资料:边际技术替代率
是指在产出量保持不变的条件下,用一种投入要素Y替代另一种投入要素X的技术上的比率。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条