Skip to main content

Generic Attacks on Symmetric Ciphers

  • Conference paper
Information Security and Cryptology – ICISC 2006 (ICISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4296))

Included in the following conference series:

Abstract

In this talk, we consider the important problem of generic attacks on symmetric cipher algorithms. We review the work on exhaustive search attacks, especially with respect to DES. An interesting variant of exhaustive search is to use a so-called time-memory trade-off (TMTO) attack. This attack and its many variants will be described and recent research on TMTO attacks will be surveyed. The effectiveness of generic attacks is determined by improvements in computer technology and the related costs. We will attempt to derive suitable relationships between these parameters. Such relationships will be used to address questions about how secure are 80-bit and 128-bit ciphers. The talk will also cover research on generic attacks using non-conventional technology. Finally, we will relate some modern ideas to earlier ideas used in the cryptanalysis of Enigma.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sarkar, P. (2006). Generic Attacks on Symmetric Ciphers. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_2

Download citation

  • DOI: https://doi.org/10.1007/11927587_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49112-5

  • Online ISBN: 978-3-540-49114-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics