Home
last modified time | relevance | path

Searched full:attacks (Results 1 – 25 of 795) sorted by relevance

12345678910>>...32

/external/openthread/third_party/mbedtls/repo/
DSECURITY.md24 We classify attacks based on the capabilities of the attacker.
26 ### Remote attacks
33 Mbed TLS aims to fully protect against remote attacks and to enable the user
34 application in providing full protection against remote attacks. Said
44 ### Local attacks
50 #### Timing attacks argument
57 Mbed TLS provides limited protection against timing attacks. The cost of
58 protecting against timing attacks widely varies depending on the granularity of
63 As attacks keep improving, so does Mbed TLS's protection. Mbed TLS is moving
68 physical side channels as well. Remote and physical timing attacks are covered
[all …]
/external/mbedtls/
DSECURITY.md24 We classify attacks based on the capabilities of the attacker.
26 ### Remote attacks
33 Mbed TLS aims to fully protect against remote attacks and to enable the user
34 application in providing full protection against remote attacks. Said
44 ### Local attacks
50 #### Timing attacks argument
57 Mbed TLS provides limited protection against timing attacks. The cost of
58 protecting against timing attacks widely varies depending on the granularity of
63 As attacks keep improving, so does Mbed TLS's protection. Mbed TLS is moving
68 physical side channels as well. Remote and physical timing attacks are covered
[all …]
/external/wycheproof/
DREADME.md14 Project Wycheproof tests crypto libraries against known attacks. It is developed
32 literature and implemented most known attacks. We have over 80 test cases which
37 While we are committed to develop as many attacks as possible, Project
39 library is secure, it just means that it is not vulnerable to the attacks that
41 new attacks. Nevertheless, with Project Wycheproof developers and users now can
42 check their libraries against a large number of known attacks, without having
62 The tests detect whether a library is vulnerable to many attacks, including
64 - Invalid curve attacks
66 - Of course, all Bleichenbacher’s attacks
/external/wycheproof/doc/
Drsa.md38 PKCS #1 v1.5 padding is susceptible to adaptive chosen ciphertext attacks and
44 [BFKLSST12] analyze the difficult of attacks based on different types of
63 attacks require a large number of ciphertexts to be detected if random
86 preimage attacks against weak hashes are possible, even if the hashes are
101 \[B98]: D. Bleichenbacher, "Chosen ciphertext attacks against protocols based on
110 attacks can be successful with even a small number of queries.
115 \[BFKLSST12]: "Efficient padding oracle attacks on cryptographic hardware" R.
Ddh.md3 ## Subgroup confinement attacks
11 against such attacks have been proposed: For example IKE uses fields of order p
20 attacks NIST requires that public keys are validated, i.e. by checking that a
35 subgroup confinement attacks. Without a key validation it is insecure to use the key-pair
97 "Methods for Avoiding 'Small-Subgroup' Attacks on the Diffie-Hellman Key Agreement Method for S/MIM…
Ddsa.md67 ## Timing attacks
149 Hence, k severely biased. Attacks against DSA with biased k are well known.
155 used here. More generally, attacks based on lattice reduction were developed
180 “Lattice Attacks on Digital Signature Schemes”
/external/rust/android-crates-io/crates/ahash/
DFAQ.md1 ## How does aHash prevent DOS attacks
3 … or partial collisions.](https://github.com/tkaitchuck/aHash/wiki/How-aHash-is-resists-DOS-attacks)
9 …lysis](https://github.com/tkaitchuck/aHash/wiki/How-aHash-is-resists-DOS-attacks#differential-anal…
16 [differential attacks launched by the sipHash authors](https://emboss.github.io/blog/2012/12/14/bre…
21 …'chain' collisions. (This has been the major technique used to weaponize attacks on other hash fun…
23 …available on [the wiki](https://github.com/tkaitchuck/aHash/wiki/How-aHash-is-resists-DOS-attacks).
103 service attacks. While `aHash` has both very strong scrambling and very high performance.
DREADME.md4 [DOS resistant hash](https://github.com/tkaitchuck/aHash/wiki/How-aHash-is-resists-DOS-attacks) cur…
12attacks where an attacker sends a large number of items whose hashes collide that get used as keys…
/external/wycheproof/java/com/google/security/wycheproof/testcases/
DRsaEncryptionTest.java38 // - ciphertext == modulus timing attacks
67 * <li>Bleichenbacher, "Chosen ciphertext attacks against protocols based on the RSA encryption
73 * <li>Bardou, Focardi, Kawamoto, Simionato, Steel, Tsay "Efficient Padding Oracle Attacks on
78 * queries" RSA conference, 2010 This paper shows that padding oracle attacks can be
90 * <li> Some attacks require a large number of ciphertexts to be detected if random ciphertexts
141 * chosen message attacks. Nonetheless, to minimize the damage of such an attack an implementation
DDhTest.java37 * <p>Subgroup confinment attacks:
43 * Several countermeasures against such attacks have been proposed: For example IKE uses
50 * confinment attacks NIST requires that public keys are validated, i.e. by checking that a public
64 * subgroup confinement attacks. Without a key validation it is insecure to use the key-pair
85 * <p>RFC 2785, "Methods for Avoiding 'Small-Subgroup' Attacks on the Diffie-Hellman Key Agreement
262 // should be chosen to prevent attacks. in testKeyPair()
281 // not satisfied for the group generated by g. Moreover, attacks using Pohlig-Hellman in testKeyPair()
305 // I.e., subgroup confinment attacks can find at least keySize - r.bitLength() bits of the key. in testKeyPair()
361 * itself cannot prevent all small-subgroup attacks because of the missing parameter q in the
/external/googleapis/google/cloud/securitycenter/v1/
Dcloud_armor.proto41 // Information about potential Layer 7 DDoS attacks identified by [Google
50 // application layer attacks. For example, “L3_4” for Layer 3 and Layer 4 DDoS
51 // attacks, or “L_7” for Layer 7 DDoS attacks.
/external/wycheproof/keystore-cts/java/com/google/security/wycheproof/testcases/
DRsaEncryptionTest.java109 * RSA-PKCS #1 v 1.5 is susceptible to chosen ciphertext attacks. The seriousness of the
118 * <li>Bleichenbacher, "Chosen ciphertext attacks against protocols based on the RSA encryption
124 * <li>Bardou, Focardi, Kawamoto, Simionato, Steel, Tsay "Efficient Padding Oracle Attacks on
129 * queries" RSA conference, 2010 This paper shows that padding oracle attacks can be
141 * <li>Some attacks require a large number of ciphertexts to be detected if random ciphertexts
156 // Padding oracle attacks become simpler when the decryption leaks detailed information about in testDecryption()
/external/rust/android-crates-io/crates/fxhash/
Dlib.rs24 //! not designed to prevent any attacks for determining collisions which could be used to
26 //! this hash in places where collissions or DDOS attacks may be a concern.
125 /// DOS attacks are a concern.
189 /// DOS attacks are a concern.
244 /// DOS attacks are a concern.
DREADME.md7attacks for determining collisions which could be used to potentially cause quadratic behavior in …
/external/aac/libAACenc/src/
Dblock_switch.cpp136 /* static const float attackRatio = 10.0; */ /* lower ratio limit for attacks */
138 FL2FXCONST_DBL(0.1f); /* inverted lower ratio limit for attacks */
142 /* minimum energy for attacks */
145 BLOCK_SWITCH_ENERGY_SHIFT); /* minimum energy for attacks */
155 /* static const float attackRatio = 10.0; */ /* lower ratio limit for attacks */
157 FL2FXCONST_SGL(0.1f); /* inverted lower ratio limit for attacks */
158 /* minimum energy for attacks */
161 BLOCK_SWITCH_ENERGY_SHIFT); /* minimum energy for attacks */
/external/rust/android-crates-io/crates/rustc-hash/
DREADME.md7 …ctions/struct.HashMap.html) uses SipHash by default, which provides resistance against DOS attacks.
8 These attacks aren't a concern in the compiler so we prefer to use a quicker,
/external/pigweed/pw_software_update/public/pw_software_update/
Dconfig.h24 // attacks.
48 // 3. Recover from fast-forward attacks.
/external/rust/android-crates-io/crates/fnv/
DREADME.md19 provides no protection against collision attacks, where a malicious user
26 denial-of-service attacks, and can assume that its inputs are going to be
/external/arm-trusted-firmware/docs/process/
Dsecurity-hardening.rst21 Handling Denial of Service attacks
39 Timing leakage attacks from the Non-secure world
72 would allow it to carry out side-channel timing attacks against the Secure
/external/trusty/arm-trusted-firmware/docs/process/
Dsecurity-hardening.rst21 Handling Denial of Service attacks
39 Timing leakage attacks from the Non-secure world
72 would allow it to carry out side-channel timing attacks against the Secure
/external/python/cpython3/Doc/library/
Dsecrets.rst105 `brute-force attacks <https://en.wikipedia.org/wiki/Brute-force_attack>`_,
135 `timing attacks <https://codahale.com/a-lesson-in-timing-attacks/>`_.
/external/pigweed/pw_bluetooth_sapphire/host/sm/public/pw_bluetooth_sapphire/internal/host/sm/
Dutil.h174 // initiator to avoid replay attacks. |responder_nonce|: Nonce value generated
175 // by the responder to avoid replay attacks. |initiator_addr|: Device address
217 // attacks |responder_nonce|: nonce value generated by the responder to avoid
218 // replay attacks
/external/jackson-databind/src/test/java/com/fasterxml/jackson/databind/jsontype/ext/
DExternalTypeIdWithCreatorTest.java11 public enum Attacks { KICK, PUNCH } enum in ExternalTypeIdWithCreatorTest
15 public Attacks preferredAttack;
/external/aws-sdk-java-v2/services/shield/src/main/resources/codegen-resources/
Dservice-2.json52 … Services account to assist with DDoS attack mitigation during potential attacks. This enables the…
212 …"documentation":"<p>Provides information about the number and type of attacks Shield has detected …
300 …ops Shield Advanced from creating, verifying, and applying WAF rules for attacks that it detects f…
386 …s causes Shield Advanced to create, verify, and apply WAF rules for DDoS attacks that it detects f…
431 …"documentation":"<p>Returns all ongoing DDoS attacks or all DDoS attacks during a specified time p…
622 … that it creates on behalf of the protected resource in response to DDoS attacks. You specify this…
625 …er to respond to application layer events that Shield Advanced determines to be DDoS attacks. </p>"
801 …"documentation":"<p>Information about the volume of attacks during the time period. If the accompa…
805 …"documentation":"<p>The number of attacks detected during the time period. This is always present,…
839 "documentation":"<p>The list of attacks for a specified time period.</p>"
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml41 be insufficient: key space is too small against current attacks,
44 makes attacks easier, there is no replay protection, and non-keyed

12345678910>>...32