搜索结果: 1-15 共查到“军事学 Weakness”相关记录18条 . 查询时间(0.093 秒)
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
PRNG CSPRNG Spritz
2016/1/5
We found a statistical weakness in the Spritz algorithm designed by Ronald L. Rivest
and Jacob C. N. Schuldt. For N = 8: P rob(output(x) = output(x + 2)) = 1/N + 0.000498. The
bias becomes statistic...
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thom\'{e}, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. We show that these new a...
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Discrete Logarithm Cryptography Weakness
2014/3/6
In 2013, Joux and then Barbulsecu et al. presented new algorithms for computing discrete logarithms in finite fields of small characteristic. Shortly thereafter, Adj et al. presented a concrete analys...
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
foundations quantum cryptography
2014/3/11
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The gene...
Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications
Authenticated key agreement Off-line password guessing attack
2011/7/25
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
authentication security elliptic curve cryptosystem wireless sensor network
2011/6/9
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
ID-based Mutual authentication Key agreement Elliptic curve Cryptosystem
2010/11/26
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s p...
Security weakness of two authenticated key exchange protocols from pairings
Key compromise impersonation attack Authenticated key exchange Multiple key Perfect forward secrecy
2010/7/13
Recently, Liu proposed two authenticated multiple key exchange protocols using pairings, and claimed two protocols featured many security attributes. In this paper, we show that Liu’s protocols are in...
On a weakness of the Tu-Deng function and its repair
Algebraic attack Boolean function Stream cipher
2009/12/29
We observe that the function introduced by Z. Tu and Y. Deng in the
ePrint Archive paper 2009/272 is weak against fast algebraic attacks. We
propose an alternative function sharing all the propertie...
Weakness of a three-party password-based authenticated key exchange protocol
password-based authenticated key exchange three-party
2009/11/18
To guarantee the quality of the growing popular
communication services, quite recently, Huang presented a simple
and efficient three-party password-based authenticated key
exchange protocol in Inte...
Security Weakness in Two Authenticated Key Exchange Protocols
Authenticated key exchange Key compromise impersonation attack Ephemeral key compromise attack
2009/11/18
In ICA3PP 2009, Xinglan Zhang proposed two one-round
authenticated key exchange protocols and proved their security in the
standard model. In this paper, we analyze these two protocols and find
tha...
Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
Key predistribution Combinatorial Design Orthogonal Array
2009/6/12
A Sensor Node in Wireless Sensor Network has very limited
resources such as processing capability, memory capacity, battery power,
and communication capability. When the communication between any
t...
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Three-party key agreement Password Verifier Active adversary
2009/4/3
Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63{68] have proposed
two new three-party protocols, one for password-based authenticated key agreement
and one for verifier-based authent...
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Conference key distribution active attack colluding adversaries
2009/3/31
Very recently, Jung, Paeng and Kim [IEEE Communications Letters, Vol
8, No 7, pp 446{448, July 2004] have demonstrated the insecurity of Xu and Tilborg's
ID-based conference key distribution scheme,...