Abstract
In 1980 M. Hellman presented a cryptanalytic time-memory trade-off which reduces computational time by distributing possible key solution space N between memory M and time T, by using a pre-computed table, for block ciphers. This method was applied to stream ciphers by A. Biryukov and A. Shamir with consideration of known output data D. Recently, P. Oechslin described a technique which makes an improvement to Hellman’s original idea in computational time with introducing the rainbow chain model for block ciphers. In this paper, we present the application of the rainbow chain model as a time-memory trade-off attack for stream ciphers.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Trans. Inform. Theory 26, 525–530 (1980)
Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617–630. Springer, Heidelberg (2003)
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Trade-Offs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Golic, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)
Babbage, S.: A Space/Time Trade-Off in Exhaustive Search Attacks on Stream Ciphers. In: European Convention on Security and Detection IEE Conference Publication, vol. 408 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Erguler, I., Anarim, E. (2005). A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. In: Yolum, p., Güngör, T., Gürgen, F., Özturan, C. (eds) Computer and Information Sciences - ISCIS 2005. ISCIS 2005. Lecture Notes in Computer Science, vol 3733. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569596_24
Download citation
DOI: https://doi.org/10.1007/11569596_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29414-6
Online ISBN: 978-3-540-32085-2
eBook Packages: Computer ScienceComputer Science (R0)