Publication | Closed Access
A cryptanalytic time-memory trade-off
691
Citations
8
References
1980
Year
Block ModeCryptanalytic Time-memory Trade-offEngineeringInformation SecurityComputer ArchitectureComputational ComplexityProbabilistic ComputationHardware SecurityProbabilistic MethodCryptanalytic AttackCryptanalysisTable LookupComputer EngineeringLightweight CryptographyComputer ScienceProbability TheoryData SecurityCryptographyPseudorandom Number Generator
A probabilistic method is presented which cryptanalyzes any <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N</tex> key cryptosystem in <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N^{2/3}</tex> operational with <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N^{2/3}</tex> words of memory (average values) after a precomputation which requires <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N</tex> operations. If the precomputation can be performed in a reasonable time period (e.g, several years), the additional computation required to recover each key compares very favorably with the <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N</tex> operations required by an exhaustive search and the <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">N</tex> words of memory required by table lookup. When applied to the Data Encryption Standard (DES) used in block mode, it indicates that solutions should cost between <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1 and</tex> 100 each. The method works in a chosen plaintext attack and, if cipher block chaining is not used, can also be used in a ciphertext-only attack.
| Year | Citations | |
|---|---|---|
Page 1
Page 1