We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AES.java#L50 中加密时使用的IV与Key一致,这削弱了AES的安全性,可能受到 已知明文攻击(Known-Plaintext Attack, KPA) 改进建议: 每次加密时,都应该生成一个随机的 IV。这个 IV 可以和密文一起传输,因为它不需要保密,但它必须是唯一的。 IV 和密钥必须是完全独立的,绝对不能使用相同的数据。IV 的作用是增强加密的随机性,而密钥的作用是保证加密的安全性。
已知明文攻击(Known-Plaintext Attack, KPA)
No response
The text was updated successfully, but these errors were encountered:
补充:我发现在 #6262 中有人提出过相关问题,但被标记为 wontfix , 可否给出对此问题不修复的更多解释?谢谢。
wontfix
Sorry, something went wrong.
No branches or pull requests
确认
功能改进
AES.java#L50
中加密时使用的IV与Key一致,这削弱了AES的安全性,可能受到
已知明文攻击(Known-Plaintext Attack, KPA)
改进建议:
每次加密时,都应该生成一个随机的 IV。这个 IV 可以和密文一起传输,因为它不需要保密,但它必须是唯一的。
IV 和密钥必须是完全独立的,绝对不能使用相同的数据。IV 的作用是增强加密的随机性,而密钥的作用是保证加密的安全性。
参考资料
No response
The text was updated successfully, but these errors were encountered: