弱密钥

  • 网络Weak key
弱密钥弱密钥
  1. 该文介绍了IDEA算法,并分析了IDEA算法存在弱密钥的原因,研究设计并实现了变长密钥的IDEA算法。

    The paper first analyzes the cause for weak keys in IDEA , and further offers an improved algorithm of the variable length keys .

  2. 本文分析了DES的弱密钥、半弱密钥和1/4弱密钥的代数构造,并发现了DES的1/4弱密钥远多于48种。

    Algebraic structures of the DES 's weak keys , semi-weak keys , and 1 / 4-weak keys are presented , and many more than 48 of the DES 's 1 / 4-weak keys are found .

  3. 提出了离散对数公开密钥算法中的弱密钥问题;

    The author proposes there are Weak-keys in Public Key Cryptosystem based on Discrete Logarithm .

  4. 创造了一套新的攻击方法,破解了存在弱密钥问题的离散对数公开密钥系统。

    The author designs a new attack method which can be accomplished when Weak-keys exist in Public Key Cryptosystem based on Discrete Logarithm .

  5. 在研究离散对数算法的基础上,作者提出了离散对数公开密钥算法存在着弱密钥的问题,利用作者设计的一套攻击方法,可以破解存在着弱密钥问题的离散对数公开密钥系统。

    Then , a new attack method has been designed , which is able to accomplish the attack when Weak-keys exist in Public Key Cryptosystem based on Discrete Logarithm .

  6. 在某台主机上使用弱帐户密钥,应为这个项目找到或创建“帐户文件”。

    To use your weak account key on a given host , find or create the'account file'for this project .

  7. EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。

    EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption .