1) equivalent key attack algorithm
等效密钥攻击算法
2) secret key attacking
密钥攻击
3) Equivalent key
等效密钥
1.
In this paper, taking the ZLL chaotic stream cipher as example, the problem of equivalent keys of chaotic cipher is studied.
以ZLL混沌序列密码算法为例分析了混沌密码算法的等效密钥问题,证明了ZLL混沌序列密码算法等效密钥存在的根本原因是混沌映射的非双射性,求出了ZLL混沌序列密码算法等效密钥个数的期望为2。
4) key recovery attacking
密钥恢复攻击
5) key substitution attacks
密钥替换攻击
1.
This paper shows that the two short signature schemes provably secure in the standard model are all insecure against key substitution attacks under the multi-user setting,namely an adversary can generate a new public key satisfying legitimate signatures created by the legitimate signer.
针对在标准模型下可证安全的两个短签名方案,该文指出这两个方案在多用户环境下是不安全的,不能抵抗密钥替换攻击,即一个攻击者能够生成一个新公钥满足合法签名者生成的合法签名。
6) Related-key attack
相关密钥攻击
补充资料:等效
1.效用相同。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条