穷举攻击 meaning in English
exhaustive attack
Examples
- Public - key encryption has a much larger keyspace , or range of possible values for the key , and is therefore less susceptible to exhaustive attacks that try every possible key
公钥加密具有更大的密钥空间(或密钥的可能值范围) ,因此不大容易受到对每个可能密钥都进行尝试的穷举攻击。 - In this paper we propose a design of safety algorithm for rf cards that has only 4 bit operations . this design of safety algorithm has been applied to some rf cards
摘要提出了一种射频卡信息安全算法的设计方案。经过论证,该算法能经受2 ^ 64次穷举攻击,并通过了公司的测试,已在煤气预付费系统的射频卡中得到了应用。 - The basic pseudo - randomness of the generalized self - shrinking sequences family such as their least period , linear complexity and others are introduced in chapter two . in chapter three , exhaustive key attack and distinguishing attack are introduced and applied to self - shrinking sequences
第三章讨论了穷举攻击和区分性攻击,这是两种最为常规的对于每一种密钥流序列都可以适用的攻击方法,但是区分性攻击往往比穷举性攻击来得有效。