ID | 原文 | 译文 |
45766 | 研究了卫星电话 GMR-2 流密码算法的碰撞特性, | A collision property analysis of the GMR-2 cipher used in the satellite phone was presented. |
45767 | 以算法的 F 组件为桥梁,通过分析密钥差分与算法 F组件输出碰撞以及 F 组件输出碰撞与密钥流字节碰撞之间的联系,最终得到密钥差分与密钥流碰撞之间的关系。 | By using the F-component as a bridge, the link between the difference of the key byte and the collision of the output of F as well as the link between the collision of the output of F and the collision of keystream byte were analyzed, which finally revealed the relationship between the difference of the original key byte and the keystream collision. |
45768 | 研究表明,对于相同的帧号,当密钥对只在某一个字节上有差分,且差分的前 4 bit 与后 4 bit 相等时,该密钥对将以高概率使密钥流发生碰撞。 | The theoretical analysis showed that for a random frame number, a special chosen key pair could lead to a keystream collision with a high probability,when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit. |
45769 | 实验结果显示,密钥流碰撞概率为 2 −8.248 ,远远高于理想碰撞概率 2 −120 。 | The experimental result shows that the keystream collision probability is 2 −8.248 , which is far higher than the ideal collision probability 2 −120. |
45770 | 这再次证明了 GMR-2 加密算法存在较大的安全隐患。 | This proves once again, that there exists serious potential security hazards in theGMR-2 cipher. |
45771 | 网络窃听攻击是网络通信安全的重大威胁, | Eavesdropping attack hereby was the major attack for traditional network communication. |
45772 | 它具有隐蔽性和无干扰性的特点,很难通过传统的流量特征识别的被动防御方法检测到。 | As this kind of at-tacks was stealthy and untraceable, it was barely detectable for those feature detection or static configuration based passive defense approaches. |
45773 | 而现有的路径加密和动态地址等方法只能混淆网络协议的部分字段,不能形成全面的防护。 | Since existing encryption or dynamic address methods could only confuse part of fields of net-work protocols, they couldn’t form a comprehensive protection. |
45774 | 提出一种基于协议无感知转发(POF, protocol-oblivious forwarding)技术的移动目标防御(MTD, moving target defense)方法,通过私有协议分组随机化策略和动态路径欺骗分组随机丢弃策略, | Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed, through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy. |
45775 | 大大提高攻击者实施网络窃听的难度,保障网络通信过程的隐私性。 | It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process. |