ID |
原文 |
译文 |
45766 |
研究了卫星电话 GMR-2 流密码算法的碰撞特性, |
A collision property analysis of the GMR-2 cipher used in the satellite phone was presented. |
45767 |
以算法的 F 组件为桥梁,通过分析密钥差分与算法 F组件输出碰撞以及 F 组件输出碰撞与密钥流字节碰撞之间的联系,最终得到密钥差分与密钥流碰撞之间的关系。 |
By using the F-component as a bridge, the link between the difference of the key byte and the collision of the output of F as well as the link between the collision of the output of F and the collision of keystream byte were analyzed, which finally revealed the relationship between the difference of the original key byte and the keystream collision. |
45768 |
研究表明,对于相同的帧号,当密钥对只在某一个字节上有差分,且差分的前 4 bit 与后 4 bit 相等时,该密钥对将以高概率使密钥流发生碰撞。 |
The theoretical analysis showed that for a random frame number, a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit. |
45769 |
实验结果显示,密钥流碰撞概率为 2 −8.248 ,远远高于理想碰撞概率 2 −120 。 |
The experimental result shows that the keystream collision probability is 2 −8.248 , which is far higher than the ideal collision probability 2 −120. |
45770 |
这再次证明了 GMR-2 加密算法存在较大的安全隐患。 |
This proves once again, that there exists serious potential security hazards in theGMR-2 cipher. |
45771 |
网络窃听攻击是网络通信安全的重大威胁, |
Eavesdropping attack hereby was the major attack for traditional network communication. |
45772 |
它具有隐蔽性和无干扰性的特点,很难通过传统的流量特征识别的被动防御方法检测到。 |
As this kind of at-tacks was stealthy and untraceable, it was barely detectable for those feature detection or static configuration based passive defense approaches. |
45773 |
而现有的路径加密和动态地址等方法只能混淆网络协议的部分字段,不能形成全面的防护。 |
Since existing encryption or dynamic address methods could only confuse part of fields of net-work protocols, they couldn’t form a comprehensive protection. |
45774 |
提出一种基于协议无感知转发(POF, protocol-oblivious forwarding)技术的移动目标防御(MTD, moving target defense)方法,通过私有协议分组随机化策略和动态路径欺骗分组随机丢弃策略, |
Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed, through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy. |
45775 |
大大提高攻击者实施网络窃听的难度,保障网络通信过程的隐私性。 |
It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process. |