Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for weak key 8 found (184 total)

alternate case: Weak key

Key stretching (1,817 words) [view diff] exact match in snippet view article find links to article

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force
Gemalto (4,348 words) [view diff] exact match in snippet view article find links to article
internally by Microsoft and many other companies, were affected by the Infineon weak key vulnerability, leaving their private keys deducible to attackers. Key partners
Shared secret (239 words) [view diff] exact match in snippet view article find links to article
[citation needed] Key stretching – a method to create a stronger key from a weak key or a weak shared secret Security question – implementation method Handbook
Random number generator attack (2,632 words) [view diff] exact match in snippet view article find links to article
checks against a weak key blacklist to attempt to prevent use of any of these remaining weak keys, but researchers continue to find weak key implementations
Sophie Germain Counter Mode (196 words) [view diff] exact match in snippet view article find links to article
Germain prime ⁠p − 1/2⁠ = 2127 + 6225. SGCM does prevent the specific "weak key" attack described in its paper, however there are other ways of modifying
Station-to-Station protocol (1,213 words) [view diff] exact match in snippet view article find links to article
prevent an active attacker from inserting weak parameters (and thus a weak key K). Diffie, van Oorschot & Wiener (1992) recommend against special checks
RC4 (5,062 words) [view diff] exact match in snippet view article find links to article
many applications that use RC4 simply concatenate key and nonce; RC4's weak key schedule then gives rise to related-key attacks, like the Fluhrer, Mantin
Hawaii's Opportunity Probation with Enforcement (2,149 words) [view diff] case mismatch in snippet view article find links to article
effectiveness of the HOPE project: 1. An Over-Emphasis on a Potentially Weak Key Ingredient: the use of swift-and-certain sanctions. HOPE assumes that specific