PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact


PDF Archive search engine
Last database update: 07 August at 14:38 - Around 220000 files indexed.

Show results per page

Results for «cipher»:

Total: 70 results - 0.068 seconds

15N13-IJAET0313523 revised 100%

In this paper, cipher text only attack is adopted and varieties of optimum keys are generated based on the cost function values.


13/05/2013 www.pdf-archive.com

My first scan 02ko24 99%

26 Hosts Summary (Executive) Summary Critical High Medium Low Info Total 1 1 11 7 34 54 Details Severity Plugin Id Name Critical (10.0) 10264 SNMP Agent Default Community Names High (7.5) 41028 SNMP Agent Default Community Name (public) Medium (6.4) 51192 SSL Certificate Cannot Be Trusted Medium (6.4) 57582 SSL Self-Signed Certificate Medium (5.8) 50686 IP Forwarding Enabled Medium (5.8) 53847 FTP Service AUTH TLS Plaintext Command Injection Medium (5.0) 10079 Anonymous FTP Enabled Medium (5.0) 12217 DNS Server Cache Snooping Remote Information Disclosure Medium (5.0) 76474 SNMP 'GETBULK' Reflection DDoS Medium (5.0) 81606 SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) Medium (4.3) 26928 SSL Weak Cipher Suites Supported Medium (4.3) 90317 SSH Weak Algorithms Supported Medium (4.0) 35291 SSL Certificate Signed Using Weak Hashing Algorithm Low (2.6) 34324 FTP Supports Cleartext Authentication Low (2.6) 65821 SSL RC4 Cipher Suites Supported (Bar Mitzvah) Low (2.6) 70658 SSH Server CBC Mode Ciphers Enabled Low (2.6) 71049 SSH Weak MAC Algorithms Enabled Low (2.6) 83738 SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) Low (2.6) 83875 SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) Low 69551 SSL Certificate Chain Contains RSA Keys Less Than 2048 bits Info 10092 FTP Server Detection Info 10114 ICMP Timestamp Request Remote Date Disclosure Info 10267 SSH Server Type and Version Information Info 10287 Traceroute Information Info 10386 Web Server No 404 Error Code Check Info 10550 SNMP Query Running Process List Disclosure 4 Info 10551 SNMP Request Network Interfaces Enumeration Info 10728 ISC BIND 9.x AUTHORS Map Remote Version Disclosure Info 10800 SNMP Query System Information Disclosure Info 10863 SSL Certificate Information Info 10881 SSH Protocol Versions Supported Info 11002 DNS Server Detection Info 11154 Unknown Service Detection:


27/10/2016 www.pdf-archive.com

3N19-IJAET0319309 v7 iss1 30-37 99%

Encrypting plaintext results in unreadable gibberish called cipher-text.


04/07/2014 www.pdf-archive.com

4I17-IJAET1117396 v6 iss5 1977-1987 99%

A cryptosystem is a set of algorithm, indexed by some keys(s), for encoding messages into cipher text and decoding them back into plaintext [1].


04/07/2014 www.pdf-archive.com

24I20-IJAET0520915 v7 iss2 495-499 96%

Time complexity refers to CPU time taken to encrypt plaintext to cipher text and back cipher text to original plain text.


04/07/2014 www.pdf-archive.com

IJEAS0405026 94%

If one bit or byte is processed at a time it is said as Stream Ciphers or state cipher, RC4 is a popularly known algorithm of a stream cipher, a one-time pad is another example of the Stream cipher.


10/09/2017 www.pdf-archive.com

SSLServerTest 91%

Non-compliant with PCI DSS requirements Information The server prefers cipher suites supporting Perfect-Forward-Secrecy.


22/04/2018 www.pdf-archive.com

asiaccs2017 90%

Our findings include fingerprinting mechanisms, DoS attacks, and downgrade attacks where an adversary can force usage of the insecure WPA-TKIP cipher.


16/10/2017 www.pdf-archive.com

13I20-IJAET0520823 v7 iss2 410-415 88%

Basics about Cryptography Symmetric key Cipher-In this technique both the sender and receiver uses common key for encryption and decryption [1-5].


04/07/2014 www.pdf-archive.com

Renegotiating TLS 88%

Basic TLS begins negotiation with a Client Hello message sent by the client to the server, including the list of supported cipher suites.


29/09/2013 www.pdf-archive.com

Test 4 Spear BitGo Keycard for Test-Wallet 81%

:"ccm","adata":"","cipher":"aes","salt":"ibXlDkPAN9E=","ct":"erO5sZP5ShxiCU 6ptGtgvB2GDJIPqFavwf0fo+z23MakHq0bUA1gZC9G5jH0GVyjypA2Ixz7ht+CryPZaS/RRhPVs R0yq3DZQoThjvZjIyU6NADuuMik5O+cVoRUSKFv1RBi1BkHbk3ptiiHmY56y9mUZ2LdHJ4="} B:


04/06/2017 www.pdf-archive.com

20170626 BitGo Keycard Test-Wallet 81%

:"ccm","adata":"","cipher":"aes","salt":"Ekg64mwh+ME=","ct":"nzxc1XUDSZ4j25 RmymIKGot6orASe6A8V5cEVEZqV6znMK5RYIo6uSCcOyVMcj5MurwMuW6nL2ceOJTynXa7zYRc+ dnLYTPhF3OipBWXAAWEleTMVaMybEsFeRoEmtiL0tfooriNrTKK6RqgHllOMnkgHzXb0us="} B:


27/06/2017 www.pdf-archive.com

IJETR2217 81%

Encryption provides us with higher level of security because the data stolen will be of no use to the hacker because it’s been converted to a cipher.


09/09/2017 www.pdf-archive.com


• Third, compare the ciphertext (given in the puzzles themselves) and the plaintext (derived by solution) to recover the keyword in the Beaufort Cipher (as far as I know, the better-known Vigenère Cipher would also suffice).


11/04/2016 www.pdf-archive.com

IJEAS0403035 77%

They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions [5].There are several methods to use a block cipher to build a cryptographic hash function, specifically a one-way compression function.


10/09/2017 www.pdf-archive.com

rules on fencing commodity1490 76%

Is your enclose up to cipher?


13/03/2017 www.pdf-archive.com

181981147-The-Alexander-Cipher-Will-Adams-Extract-pdf 75%

069M_tx.qxp 17/07/2007 10:41 Page iii The Alexander Cipher WILL ADAMS The Alexander Cipher iii 069M_tx.qxp 17/07/2007 10:41 Page iv Will Adams This novel is entirely a work of fiction.


27/02/2019 www.pdf-archive.com

New Kill4exam ISC-CISSP Exam 73%

Vendor: ISC Exam Code: CISSP Exam Name:


25/05/2017 www.pdf-archive.com

Test 3 Spear BitGo Keycard for My BitGo Wallet 72%

:"ccm","adata":"","cipher":"aes","salt":"JIYJc0Zx2pI=","ct":"hrbiOnqDys+uX8 gDmy4yG+N8f34R1Xatxza5b7K+KZbv6tBkRm3nbLV4WRfHxIibRtWgATK0wJDu7ZeaMwHL5SfER HwpCFQQ5ViTAskReObCid7ao9bAcojy1w0xwjFsoepI+ex2N4yhxlhxJ85REmAjtO7zJts="} B:


04/06/2017 www.pdf-archive.com

22I15-IJAET0715616 v6 iss3 1211to1219 68%

a pixel (8 bit) of a Stego-image is taken and added with an eight bit key to get a cipher pixel.


04/07/2014 www.pdf-archive.com

28I15-IJAET0715630 v6 iss3 1263to1270 66%

Sending a message in the form of cipher text might arouse suspicion on the part of the recipient whereas an “invisible” message created with steganographic algorithms will not.


04/07/2014 www.pdf-archive.com

assignment1 66%

The padded message is then 1 encrypted using a block cipher in CBC mode.


21/11/2016 www.pdf-archive.com

49I18-IJAET0118743 v6 iss6 2739-2744 66%

System maintained data privacy by the selective encryption using reverse cycle cipher technique and CDI privacy policies which enriches the concept of CDI to a good extent.


04/07/2014 www.pdf-archive.com

gsm-id 65%

the base station analyses the signals Base Station Mobile RACH Paging Request CCCH Immediate Assignment SDCCH CM Service Request Ciphering Mode Command Ciphering Mode Complete Identity Request Identity Response Setup TCH Speech Data Disconnect Release Complete Cipher Mode Connect Acknowledge FACCH Alerting Connect Speech Data FACCH Encryption Assignment Complete Cipher Mode Call Proceeding Assignment Command Encryption The base station decides how many radio channels to use and whether to switch between radio channels over time (frequency hopping) or not.


24/08/2013 www.pdf-archive.com