首页> 外文会议>International Conference on the Theory and Application of Cryptology and Security >Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
【24h】

Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers

机译:Cryptanalytic Time / Memory / Data Transoffs for Stream Ciphers

获取原文

摘要

In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM{sup}2=N{sup}2 for 1≤T≤N. Recently, Babbage and Golic pointed out that a different TM=N tradeoff attack for 1≤T≤D is applicable to stream ciphers, where is the amount of output data available to the attacker. In this paper we show that a combination of the two approaches has an improved time/memory/data tradeoff for stream ciphers of the form TM{sup}2 D{sup}2=N{sup}2 for any D{sup}2≤T≤N. In addition, we show that stream ciphers with low sampling resistance have tradeoff attacks with fewer table lookups and a wider choice of parameters.
机译:1980年,Hellman介绍了一种用于在时间t和Memory M中与N可能的键打破任意块密码的一般技术,并且由权衡曲线Tm {sup} 2 = n {sup} 2为1≤t≤n相关。最近,贝母和Golic指出,对于1≤T≤D的不同TM = n折衷攻击适用于流密码,在其中攻击者可用的输出数据量在哪里。在本文中,我们示出了两种方法的组合具有用于任何D {SUP} 2的表格TM {SUP} 2 = n {sup} 2的流密码的改进的时间/存储器/数据折衷。 ≤t≤n。此外,我们表明,具有低采样电阻的流密码具有权衡攻击,表明较少的表查找和更广泛的参数选择。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号