TMTO attacks on stream ciphers ? theory and practice
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F11%3A00052387" target="_blank" >RIV/00216224:14330/11:00052387 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
čeština
Original language name
TMTO attacks on stream ciphers ? theory and practice
Original language description
This paper deals with issues related to a cryptanalytic time-memory trade-off (TMTO) attacks on stream ciphers. We describe the basic theory and principles of TMTO attacks and their practical application on selected stream ciphers ? namely on A5/1 cipherthat is used in GSM (Global System for Mobile communications) standard. We focus mainly on the pre-computation phase of TMTO attacks. This phase includes data pre-computation and construction of various types of Hellman or Rainbow tables. The goal of the pre-computation is to cover some percentage of the key space with specially constructed chains. Our results demonstrate the real impact of various table parameters and chain constructions and show a substantial difference between theory and practice.
Czech name
TMTO attacks on stream ciphers ? theory and practice
Czech description
This paper deals with issues related to a cryptanalytic time-memory trade-off (TMTO) attacks on stream ciphers. We describe the basic theory and principles of TMTO attacks and their practical application on selected stream ciphers ? namely on A5/1 cipherthat is used in GSM (Global System for Mobile communications) standard. We focus mainly on the pre-computation phase of TMTO attacks. This phase includes data pre-computation and construction of various types of Hellman or Rainbow tables. The goal of the pre-computation is to cover some percentage of the key space with specially constructed chains. Our results demonstrate the real impact of various table parameters and chain constructions and show a substantial difference between theory and practice.
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/LA09016" target="_blank" >LA09016: Czech Republic membership in the European Research Consortium for Informatics and Mathematics (ERCIM)</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2011
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Security and Protection of Information 2011
ISBN
978-80-7231-777-6
ISSN
—
e-ISSN
—
Number of pages
13
Pages from-to
66-78
Publisher name
University of Defence
Place of publication
Brno
Event location
Brno
Event date
Jan 1, 2011
Type of event by nationality
EUR - Evropská akce
UT code for WoS article
—