| 1. | Some brute force attacks can take a week depending on the complexity of the password 根据密码的复杂程度,某些蛮力攻击可能花费一个星期的时间。 |
| 2. | Searching for a collision on purpose amounts to a brute - force attack , and is usually fairly difficult 对冲突的故意搜索意味著蛮力攻击,这通常很难。 |
| 3. | Another attack on cryptographic hashes is much easier to carry out than the average brute - force attack 另一种对密码杂凑的攻击比平均蛮力攻击容易实施得多。 |
| 4. | That s much more efficient than a brute - force attack , where the expected number of messages she would have to hash is 这比蛮力攻击要有效得多,如果使用蛮力攻击,预计她必须杂凑的讯息数为2 |
| 5. | A form of brute force attack , possibly modified selectively by probability , whereby words or phrases are tried in sequence 蛮力攻击的一种形式,可能根据概率有选择地修正,按顺序对字或短语进行尝试。 |
| 6. | To get the same security against birthday attacks as you d want against brute - force attacks , given a symmetric cipher with key length 如果希望针对生日攻击获得和针对蛮力攻击一样的安全性,给定一个密钥长度为 |
| 7. | The analysis results show that the cryptosystem can resist brute attack and differential attack , and it is also of high security and strong practicability 分析结果表明该算法可以抵抗蛮力攻击和差分分析攻击,具有较高的安全性和很强的实用性。 |
| 8. | If it would take alice a million years to perform a successful brute - force attack , she could probably perform a successful birthday attack in under a week 如果alice执行一次成功的蛮力攻击需要一百万年,那么她也许一周以内就可以完成一次成功的生日攻击。 |
| 9. | The first useful property of an xml signature is that it can be applied to any sort of digital content sometimes called a data object , including xml 已知密文攻击的一个常见方式是蛮力攻击,该方法使用每一个可能的密钥来解密密文(回忆前面的汽车示例) 。 |
| 10. | A particular form of brute - force attack named for the fact that in a group of 23 people , the probability of two or more sharing the same birthday is greater than 1 2 以23个人为一组的人中有两个或两个以上的人在同一天生日的概率大于1 / 2这一事实命名的一种特殊形式的蛮力攻击。 |