ID 原文 译文
45766 研究了卫星电话 GMR-2 流密码算法的碰撞特性, A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.
45767 以算法的 F 组件为桥梁,通过分析密钥差分与算法 F组件输出碰撞以及 F 组件输出碰撞与密钥流字节碰撞之间的联系,最终得到密钥差分与密钥流碰撞之间的关系。 By using the F-component as a bridge, the link between the difference of the key byte and the collision of the output of F as well as the link between the collision of the output of F and the collision of keystream byte were analyzed, which finally revealed the relationship between the difference of the original key byte and the keystream collision.
45768 研究表明,对于相同的帧号,当密钥对只在某一个字节上有差分,且差分的前 4 bit 与后 4 bit 相等时,该密钥对将以高概率使密钥流发生碰撞。 The theoretical analysis showed that for a random frame number, a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.
45769 实验结果显示,密钥流碰撞概率为 2 −8.248 ,远远高于理想碰撞概率 2 −120 。 The experimental result shows that the keystream collision probability is 2 −8.248 , which is far higher than the ideal collision probability 2 −120.
45770 这再次证明了 GMR-2 加密算法存在较大的安全隐患。 This proves once again, that there exists serious potential security hazards in theGMR-2 cipher.
45771 网络窃听攻击是网络通信安全的重大威胁, Eavesdropping attack hereby was the major attack for traditional network communication.
45772 它具有隐蔽性和无干扰性的特点,很难通过传统的流量特征识别的被动防御方法检测到。 As this kind of at-tacks was stealthy and untraceable, it was barely detectable for those feature detection or static configuration based passive defense approaches.
45773 而现有的路径加密和动态地址等方法只能混淆网络协议的部分字段,不能形成全面的防护。 Since existing encryption or dynamic address methods could only confuse part of fields of net-work protocols, they couldn’t form a comprehensive protection.
45774 提出一种基于协议无感知转发(POF, protocol-oblivious forwarding)技术的移动目标防御(MTD, moving target defense)方法,通过私有协议分组随机化策略和动态路径欺骗分组随机丢弃策略, Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed, through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.
45775 大大提高攻击者实施网络窃听的难度,保障网络通信过程的隐私性。 It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.