当前位置:网站首页>Encryption defect of icloud Keychain in Apple mobile phone
Encryption defect of icloud Keychain in Apple mobile phone
2022-07-28 11:19:00 【InfoQ】
What is? iCloud Key chain

iCloud The key chain cloud is synchronously encrypted
- If the user account has dual authentication enabled , Then use the device password to restore the managed key chain .
- If dual authentication is not set , Users need to provide a six digit password to create iCloud Safety code . besides , If dual authentication is not set , Users can specify a longer security code or allow their devices to create a random encrypted security code , They can record and save by themselves .
- The account number and password in the key chain will be saved in iCloud On , But apple can't read .
- The data in the key chain usesStrong passwordencryption .
- Apple usesDevice unlock passwordAsStrong password.


Unfortunately, encryption is flawed ,1 Gedong can be cracked
- When unlocking the phone , The phone will calculate an encryption key . In order not to let users wait too long , About less than 1 Second time , We simply follow500msCalculation .
- all 6 The digit code is :000000, 000001, ..., 999999, The total is1 One millionindividual .
- all 6 Digit code , It takes a total of 50 Thousands of seconds ~ 139 Hours.

What mistake did Apple make ?

边栏推荐
- DHCP实验演示(Huawei交换机设备配置)
- 1. Sum of two numbers
- 为什么传输前要进行编码与调制
- Installation points and precautions of split angle probe
- Software designers ask 20 questions before the exam, pay attention!!
- Related concepts of several databases
- Learn how to do e-commerce data analysis (with operation analysis index framework)
- Understand several concepts of Oracle
- Offsetof macro and container_ Of macro analysis details
- web安全入门-Radius协议应用
猜你喜欢

什么是WordPress

I use the applet container to improve the efficiency of mobile R & D by 5 times!

做数据分析,你还不懂RFM分析方法(模型)?

读懂这6本书,学习MySQL更轻松

剑指 Offer 30. 包含min函数的栈
![[JS advanced] JS functions, overloads, anonymous functions, scopes and scope chains_ 03](/img/50/754f7915ee4b2e04fdd21ae68130c6.png)
[JS advanced] JS functions, overloads, anonymous functions, scopes and scope chains_ 03

适合中小企业的进销存软件,搞定5大难题

GIS数据漫谈(五)— 地理坐标系统

web安全入门-Radius协议应用

Do you want to enroll in class for advanced soft exam
随机推荐
苹果手机iCloud钥匙串的加密缺陷
Causes and solutions of invalid ROM table
RHEL 6.4 installing SVN and Apache
剑指 Offer 09. 用两个栈实现队列
五面阿里技术专家岗,已拿offer,这些面试题你能答出多少
Crm+ zero code: easily realize enterprise informatization
用 ZEGO Avatar 做一个虚拟人|虚拟主播直播解决方案
Offsetof macro and container_ Of macro analysis details
Related concepts of several databases
Make a virtual human with zego avatar | virtual anchor live broadcast solution
机器学习强基计划0-5:为什么学习的本质是泛化能力?
web安全入门-Radius协议应用
Zero code | easily realize data warehouse modeling and build Bi Kanban
Analysis of boot process of cortex-m4 and cortex-a7 kernel
Here is a super practical excel shortcut set (common + summary of eight categories)
Clo********e: project management notes
EC20/EC25 4G模块AT指令开发总结
JWT login authentication + token automatic renewal scheme, well written!
Generation and use of Lib library files in keil and IAR
JSON初步理解