CryptoDB
Rediscovery of Time Memory Tradeoffs
Authors: | |
---|---|
Download: | |
Abstract: | Some of the existing time memory tradeoff attacks (TMTO) on specific systems can be reinterpreted as methods for inverting general oneway functions. We apply these methods back to specific systems in ways not considered before. This provides the following startling results. No streamcipher can provide security equal to its key length; some important blockcipher modes of operations are vulnerable to TMTO; and no hash function can provide preimage resistance equal to its digest length. |
BibTeX
@misc{eprint-2005-12427, title={Rediscovery of Time Memory Tradeoffs}, booktitle={IACR Eprint archive}, keywords={foundations / time memory tradeoff}, url={http://eprint.iacr.org/2005/090}, note={ jinhong@etri.re.kr 12865 received 22 Mar 2005}, author={Jin Hong and Palash Sarkar}, year=2005 }