当前位置:网站首页>Security level
Security level
2022-07-05 01:47:00 【Salted fish Feifei】
In cryptography , The security level is an encryption primitive ( Such as a ciphertext or a hash function ) Measurement of the safety intensity that can be achieved , Its unit is usually bit. An encryption scheme is n-bit Safe , It means that an attacker wants to break the scheme , Must perform at least operations . for example AES-128( The key length is 128bit) The security level of is 128-bit, It's about equal to 3072-bit Of RSA.
The target security level is , The security level that must be achieved in the design of this scheme . If the attacker can break this scheme at a lower cost , It means that the target security level is not reached .
Different encryption schemes are right “ Break through ” The definition of is not necessarily the same , It depends on the security requirements of the problem solved by the solution . For example, an encryption scheme , Such as RAS, According to some ciphertext pairs , find RSA The key of . A hash function , It may be to find an original image whose hash value is a fixed value , That is, the original image of hash function is stable , It is also possible to find that the hash values of two plaintext are the same , That is, the collision problem .
Generally speaking , For symmetric encryption scheme , The security level is the length of the key , such as AES-128 The security level of is 128bit. Of course, for hash functions , The original image problem is the length of the key , The collision problem is half the length of the key . however Phelix( One basis MAC Stream cipher of XOR operation ) have 256bit The key of , But it only provides 128bit Security level of .SHA-3 Of SHAKE variant , about 256bit Output , The security level of the original image and collision is 128bit.
For asymmetric encryption , It's a little different . Usually come a Book , Asymmetric encryption is based on a difficult mathematical problem , The problem goes in one direction ( Encryption direction ) It's simple. , And its reverse direction ( Decryption direction ) It's difficult , Need some help information ( secret key ) Can be solved simply . Breaking this encryption scheme can often be prescribed to solve a difficult problem , such as RSA It can be reduced to the problem of large integer factorization . therefore , The security level of asymmetric encryption is defined according to the time required by the best algorithm to solve this difficult problem . and , These algorithms are often faster than brute force cracking .
about “ Break through ” An encryption scheme , It refers to finding an algorithm that can break the scheme , The operation required is lower than the security level he claims . however , In practice, it may not be possible .
Now, , Less than It can be solved . and To It may be solved in the future .
Reference resources :
Wikipedia :security level
边栏推荐
- Li Kou Jianzhi offer -- binary tree chapter
- Subject 3 how to turn on the high beam diagram? Is the high beam of section 3 up or down
- 142. Circular linked list II
- 如何做一个炫酷的墨水屏电子钟?
- Great God developed the new H5 version of arXiv, saying goodbye to formula typography errors in one step, and mobile phones can also easily read literature
- La jeunesse sans rancune de Xi Murong
- Include rake tasks in Gems - including rake tasks in gems
- 小程序容器技术与物联网 IoT 可以碰撞出什么样的火花
- Talk about the things that must be paid attention to when interviewing programmers
- Word processing software
猜你喜欢
如何做一个炫酷的墨水屏电子钟?
Yyds dry inventory swagger positioning problem ⽅ formula
Do you know the eight signs of a team becoming agile?
Win:使用 Shadow Mode 查看远程用户的桌面会话
R语言用logistic逻辑回归和AFRIMA、ARIMA时间序列模型预测世界人口
Stored procedure and stored function in Oracle
Wechat applet: the latest WordPress black gold wallpaper wechat applet two open repair version source code download support traffic main revenue
PHP wechat official account development
如何搭建一支搞垮公司的技術團隊?
微信小程序:最新wordpress黑金壁纸微信小程序 二开修复版源码下载支持流量主收益
随机推荐
微信小程序;胡言乱语生成器
Yyds dry inventory jetpack hit dependency injection framework Getting Started Guide
JVM's responsibility - load and run bytecode
如何搭建一支搞垮公司的技術團隊?
R language uses logistic regression and afrima, ARIMA time series models to predict world population
Win: add general users to the local admins group
Include rake tasks in Gems - including rake tasks in gems
Flutter 2.10 update details
PowerShell: use PowerShell behind the proxy server
Win:使用 PowerShell 检查无线信号的强弱
[CTF] AWDP summary (WEB)
85.4% mIOU! NVIDIA: using multi-scale attention for semantic segmentation, the code is open source!
Rabbit MQ message sending of vertx
Database postragesq role membership
The steering wheel can be turned for one and a half turns. Is there any difference between it and two turns
Wechat applet; Gibberish generator
MATLB | multi micro grid and distributed energy trading
runc hang 导致 Kubernetes 节点 NotReady
Blue Bridge Cup Square filling (DFS backtracking)
Great God developed the new H5 version of arXiv, saying goodbye to formula typography errors in one step, and mobile phones can also easily read literature