期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
可破解任何认证系统的密码煞星Brutus
1
作者 狂风 《移动信息.新网络》 2001年第7期7-14,共8页
关键词 认证系统 Brutus软件 密码攻击法 工具软件
下载PDF
分级防御对Linux服务器的攻击
2
作者 曹元其 《网管员世界》 2003年第10期76-77,共2页
关键词 LINUX 操作系统 服务器 分布式拒绝服务攻击 密码攻击法 网络安全 计算机网络
下载PDF
零知识证明的确没有泄露信息 被引量:1
3
作者 李大兴 《密码与信息》 1991年第1期19-28,共10页
关键词 零知识证明 密码 密码攻击法
下载PDF
Differential Collision Attack on Reduced FOX Block Cipher 被引量:5
4
作者 Chen Jie Hu Yupu +1 位作者 Zhang Yueyu Dong Xiaoli 《China Communications》 SCIE CSCD 2012年第7期71-76,共6页
This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has... This paper presents a method for differen- tial collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242.8 4-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. 展开更多
关键词 CRYPTOGRAPHY block cipher FOX differential collision attack
下载PDF
Cryptanalysis of Cryptosystems Based on General Linear Group 被引量:1
5
作者 Jianwei Jia Jinhui Liu Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第6期217-224,共8页
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work. 展开更多
关键词 CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations
下载PDF
Cryptanalysis of Threshold-proxy Threshold-signature Schemes 被引量:1
6
作者 HAN Jin-guang KANG Bao-yuan 《Chinese Quarterly Journal of Mathematics》 CSCD 2010年第3期459-463,共5页
Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then onl... Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks. 展开更多
关键词 CRYPTANALYSIS impersonate attacks threshold-proxy threshold-signature
下载PDF
Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups 被引量:1
7
作者 Jinhui Liu Jianwei Jia +3 位作者 Huanguo Zhang Rongwei Yu Yong Yu Wangqing Wu 《China Communications》 SCIE CSCD 2018年第2期67-73,共7页
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp... A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions. 展开更多
关键词 CRYPTANALYSIS post-quantum com-putational cryptography conjugator searchproblem computational complexity
下载PDF
A LINEARIZATION ATTACK ON MODIFIED E_0 ALGORITHM
8
作者 Guan Jie Liu Jiandong 《Journal of Electronics(China)》 2006年第3期410-412,共3页
A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be... A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht. 展开更多
关键词 E0 encryption system Stream cipher Linearization attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部