首页> 外文期刊>Journal of Cryptology >The Full Cost of Cryptanalytic Attacks
【24h】

The Full Cost of Cryptanalytic Attacks

机译:密码分析攻击的全部成本

获取原文
获取原文并翻译 | 示例
       

摘要

An open question about the asymptotic cost of connecting many processors to a large memory using three dimensions for wiring is answered, and this result is used to find the full cost of several cryptanalytic attacks. In many cases this full cost is higher than the accepted complexity of a given algorithm based on the number of processor steps. The full costs of several cryptanalytic attacks are determined, including Shanks' method for computing discrete logarithms in cyclic groups of prime order n, which requires n~(1/2+o(1)) processor steps, but, when all factors are taken into account, has full cost n~(2/3+o(1)). Other attacks analyzed are factoring with the number field sieve, generic attacks on block ciphers, attacks on double and triple encryption, and finding hash collisions. In many cases parallel collision search gives a significant asymptotic advantage over well-known generic attacks.
机译:一个悬而未决的问题是,使用三维布线将许多处理器连接到一个大内存上的渐近成本得到了回答,该结果用于找出几种密码分析攻击的全部成本。在许多情况下,基于处理器步骤的数量,这种全额成本要高于给定算法的可接受复杂度。确定了几种密码分析攻击的全部成本,包括Shanks用于计算素数为n的循环组中的离散对数的方法,这需要n〜(1/2 + o(1))个处理器步骤,但是,在考虑所有因素的情况下考虑到全成本为n〜(2/3 + o(1))。分析的其他攻击包括数字字段筛,对分组密码的通用攻击,对双重和三次加密的攻击以及发现哈希冲突的因素。在许多情况下,并行碰撞搜索比已知的通用攻击具有明显的渐近优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号