|
關注:1
2013-05-23 12:21
求翻譯:給定一個長度為K byte的密鑰,經過KSA操作后,狀態機中的某一個狀態E有37%的可能性只依賴于密鑰中的前E個元素,在適當的環境下,從輸出結果經過逆向分析可以得到密鑰。Roos的研究成果在其后的研究中不斷地被引用到,很多攻擊方法都延續這一思路。是什么意思?![]() ![]() 給定一個長度為K byte的密鑰,經過KSA操作后,狀態機中的某一個狀態E有37%的可能性只依賴于密鑰中的前E個元素,在適當的環境下,從輸出結果經過逆向分析可以得到密鑰。Roos的研究成果在其后的研究中不斷地被引用到,很多攻擊方法都延續這一思路。
問題補充: |
|
2013-05-23 12:21:38
Given a length for the k-byte key, and after the the ksa operation, the state machine in a state e 37% of the likelihood depends only on the key in the first e elements, in an appropriate environment, from the output After the reverse analysis can be the key. roos of research results in subsequent s
|
|
2013-05-23 12:23:18
Given a length byte K for the key, after KSA operation is in a state machine, a State with 37 per cent of the E possibility only dependent on the key elements of the former E, in appropriate circumstances, from the output results can be the reverse analysis is key. The results of research in Roos af
|
|
2013-05-23 12:24:58
Assigns a length is the K byte key, after passes through the KSA operation, in state machine some condition E has 37% possibility only to rely on in the key the first E element, under the suitable environment, may obtain the key from the output result after the reversion analysis.Roos research resul
|
|
2013-05-23 12:26:38
Given a k-byte key length, after KSA operation, a e 37% a State in a state machine depends only on the possibility of first e-in the key element, in appropriate circumstances, through the output results analysis of reverse can be key. Roos research is constantly being referred to in the subsequent r
|
|
2013-05-23 12:28:18
正在翻譯,請等待...
|
湖北省互聯網違法和不良信息舉報平臺 | 網上有害信息舉報專區 | 電信詐騙舉報專區 | 涉歷史虛無主義有害信息舉報專區 | 涉企侵權舉報專區