翻訳と辞書
Words near each other
・ Meet the Wildcat
・ Meet the Woggels!
・ Meet the World
・ Meet Uncle Hussain
・ Meet Virginia
・ Meet Wally Sparks
・ Meet with Me
・ Meet You at the Jazz Corner of the World
・ Meet You There
・ Meet Your Congress
・ Meet Your Meat
・ Meet Your Mechanical Masters
・ Meet Your Navy
・ Meet Your Neighbours
・ MEET – Middle East Education Through Technology
Meet-in-the-middle attack
・ Meet-me room
・ Meet-or-release contract
・ Meet-the-People Sessions
・ Meeteer House
・ Meeteetse Formation
・ Meeteetse, Wyoming
・ Meetei Mayek (Unicode block)
・ Meetei Mayek Extensions
・ Meeten's Mill, West Chiltington
・ Meeth
・ Meeth Halt railway station
・ Meetha Lal Mehta
・ Meetha Zahar
・ Meethari Marwar


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Meet-in-the-middle attack : ウィキペディア英語版
Meet-in-the-middle attack

The Meet-in-the-Middle attack (MITM) is a generic space–time tradeoff cryptographic attack.
== Description ==

MITM is a generic attack, applicable on several cryptographic systems. The internal structure of a specific system is therefore unimportant to this attack.
An attacker requires the ability to encrypt and decrypt, and the possession of pairs of plaintexts and corresponding ciphertexts.
When trying to improve the security of a block cipher, a tempting idea is to simply use several independent keys to encrypt the data several times using a sequence of functions (encryptions). Then one might think that this doubles or even ''n''-tuples the security of the multiple-encryption scheme, depending on the number of encryptions the data must go through.
The Meet-in-the-Middle attack attempts to find a value using both of the range (ciphertext) and domain (plaintext) of the composition of several functions (or block ciphers) such that the forward mapping through the first functions is the same as the backward mapping (inverse image) through the last functions, quite literally ''meeting'' in the middle of the composed function.
The Multidimensional MITM (MD-MITM) uses a combination of several simultaneous MITM-attacks like described above, where the meeting happens in multiple positions in the composed function.
An exhaustive search on all possible combination of keys (simple brute-force) would take ''2k·j'' attempts if ''j'' encryptions has been used with different keys in each encryption, where each key is ''k'' bits long. MITM or MD-MITM improves on this performance.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Meet-in-the-middle attack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.