Computer networks: protocols, standards, interfaces
Computer networks: protocols, standards, interfaces
Fast Algorithms for Digital Signal Processing
Fast Algorithms for Digital Signal Processing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Hi-index | 0.00 |
In the present paper, the protection of information when using the remainders theorem as a means of cryptographic protection is analyzed. A classification of the attempt for illegal decryption is offered. Various types of decryptive attacks are considered. For each of them the number of checks necessary for the successful attack completion is specified. Comparison of the different types of attacks for ciphertext decryption is made. The number of systems of equation to be solved at decryptive attacks is used as a comparative criterion.