birthday attack meaning in English
生日攻击
Examples
- To get the same security against birthday attacks as you d want against brute - force attacks , given a symmetric cipher with key length
如果希望针对生日攻击获得和针对蛮力攻击一样的安全性,给定一个密钥长度为 - If it would take alice a million years to perform a successful brute - force attack , she could probably perform a successful birthday attack in under a week
如果alice执行一次成功的蛮力攻击需要一百万年,那么她也许一周以内就可以完成一次成功的生日攻击。 - As a result , bob should demand that alice use an algorithm that gives a digest size for which she cannot perform a birthday attack in any reasonable time
因此, bob应该要求xlice使用一种演算法,它所产生的摘要大小使得她不能在任何合理的时间之内完成生日攻击。 - Our study concentrates on the birthday attack , the length extension attack , the differential analysis , the message modification method , the multi - collision attack , the fixed point attack and the neutral bit attak
重点介绍了其中几种起关键作用的攻击技术:生日攻击、长度扩展攻击、差分分析技术、多冲突攻击、消息修改技术、固定点攻击和不相关位攻击技术。