ID |
原文 |
译文 |
47546 |
通过在算法最后一轮注入 2 次不同故障,可恢复出 Klein 算法的全部密钥,复杂度可忽略不计。 |
By injecting two different faults inthe last round of the algorithm, all the keys of the Klein algorithm can be recovered, and the complexity is negligible. |
47547 |
此方法可推广到基于 SP 结构和 Feistel 结构分组密码算法。 |
This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure. |
47548 |
随着信息技术的飞速发展,云计算已然成为热门话题。 |
With the rapid development of information technology, cloud computing has become a hot topic. |
47549 |
越来越多的企业和个人将计算需求和存储需求交给云端,同时云计算的安全问题也日益凸显。 |
Moreand more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored. |
47550 |
基于此,首先对云计算环境中虚拟化安全、应用安全以及数据安全下的多租户、节点通信、远程存储以及虚拟化这 4 项关键技术的安全需求进行分析,阐述了云计算安全建设的必然性。 |
First, the security requirements of the four keytechnologies, such as multi tenant, node communication, remote storage and virtualization in the cloud computingenvironment were analyzed, the necessity of the construction of cloud computing security was expounded. |
47551 |
然后,依据云计算安全需求和国家基本要求建立基于层次分析法的模糊综合评价模型,对某云服务平台进行安全性评估,得出该服务平台安全级别为“好”。 |
Then,according to the security requirements of cloud computing, fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established, and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is good. |
47552 |
最后,综合云计算环境的安全需求以及模型评价结果,针对云计算环境下的虚拟化安全、应用安全和数据安全这 3 个方面提出了一定建议,为加强云计算环境安全提供一些参考。 |
Finally, according to the security requirements of cloudcomputing environment and the results of model evaluation, some suggestions in in virtualization security, applica-tion security and data security was put forward, in order to strengthen the cloud computing security, some directionwas provided. |
47553 |
提出了一种新型的针对 SM4 算法的约减轮故障攻击, |
A novel method of fault attack based on round reduction against SM4 algorithm was proposed. |
47554 |
该攻击在加密算法的后 4 轮中导入故障,诱导缩减加密算法的迭代轮数, |
Faults were in-jected into the last four rounds of the SM4 encryption algorithm, so that the number of the algorithm’s rounds can be re-duced. |
47555 |
经过对故障数据的简单筛选,最终仅需 4 个错误密文即可恢复出完整的 128 bit 初始密钥, |
In known-ciphertext scenario, four traces are enough to recover the total 128 bit master key by screening thesefaults easily. |