Based on the requirements of message authentication code (MAC) in current network communication, this paper introduces the cryptographic secure properties of a Hash function, and analyses its applications in message authentication and the main attacks against a Hash function.
Compared with the saline immunized mice (bacteria load was 6.51±0.13), a dramatic reduction of MTB replication was observed in the spleen (bacteria load was 4.51±0.23, P<0.05) of BALB/c mice immunized with DNA vaccine following a subsequent challenge, but the protective efficacy of DNA vaccine was lower than that of BCG vaccine.
It is showed that this structure is provable resistant against linear attack.
Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
Wavelet analysis method for detection of DDoS attack on the basis of self-similarity
As the traditional methods were not suitable for the detection of small distribute denial of service (DDoS) attack and identification of busy traffic, on the basis of the influence of DDoS attack, one wavelet analysis method was proposed.
The experimental results show that the proposed method has more advantages in accurately identifying busy traffic and detection of small DDoS attack.