搜索结果: 1-8 共查到“军事学 force”相关记录8条 . 查询时间(0.176 秒)
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
Brute-force resistant ciphers Dictionary based attacks Key-guessing penalty
2018/11/29
This paper introduces Freestyle, a randomized, and variable round version of the ChaCha cipher. Freestyle demonstrates the concept of hash based halting condition, where a decryption attempt with an i...
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
DES TDES Template Attack
2018/11/7
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
How low can you go? Using side-channel data to enhance brute-force key recovery
Side channel analysis key enumeration
2016/6/15
Side-channel analysis techniques can be used to construct key recovery attacks by observing a side-channel medium such as the power consumption or electromagnetic radiation of a device while is it per...
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
FPGA WPA2 Security
2016/6/3
WPA2-Personal is widely used to protect Wi-Fi networks against illicit access. While attackers typically use GPUs to speed up the discovery of weak network passwords, attacking random passwords is con...
Honey Encryption: Security Beyond the Brute-Force Bound
Brute-Force Bound high min-entropy keys
2016/1/25
We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropy
keys such as passwords. HE is designed to produce a ciphertext which, when decrypted with a...
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
side-channel analysis DES MAC ISO/IEC 9797-1
2016/1/7
Side-channel analysis is a well-known and efficient hardware
technique to recover embedded secrets in microprocessors. Over the past
years, the state-of-the-art side-channel attacks has significantl...
USDA PARTNERS WITH ARMY AND AIR FORCE TO SUPPORT 4-H PROGRAMS FOR MILITARY YOUTH
Army Air Force 4-H clubs military installations
2006/12/4