All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

TMTO attacks on stream ciphers ? theory and practice

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F11%3A00052387" target="_blank" >RIV/00216224:14330/11:00052387 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    čeština

  • Original language name

    TMTO attacks on stream ciphers ? theory and practice

  • Original language description

    This paper deals with issues related to a cryptanalytic time-memory trade-off (TMTO) attacks on stream ciphers. We describe the basic theory and principles of TMTO attacks and their practical application on selected stream ciphers ? namely on A5/1 cipherthat is used in GSM (Global System for Mobile communications) standard. We focus mainly on the pre-computation phase of TMTO attacks. This phase includes data pre-computation and construction of various types of Hellman or Rainbow tables. The goal of the pre-computation is to cover some percentage of the key space with specially constructed chains. Our results demonstrate the real impact of various table parameters and chain constructions and show a substantial difference between theory and practice.

  • Czech name

    TMTO attacks on stream ciphers ? theory and practice

  • Czech description

    This paper deals with issues related to a cryptanalytic time-memory trade-off (TMTO) attacks on stream ciphers. We describe the basic theory and principles of TMTO attacks and their practical application on selected stream ciphers ? namely on A5/1 cipherthat is used in GSM (Global System for Mobile communications) standard. We focus mainly on the pre-computation phase of TMTO attacks. This phase includes data pre-computation and construction of various types of Hellman or Rainbow tables. The goal of the pre-computation is to cover some percentage of the key space with specially constructed chains. Our results demonstrate the real impact of various table parameters and chain constructions and show a substantial difference between theory and practice.

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/LA09016" target="_blank" >LA09016: Czech Republic membership in the European Research Consortium for Informatics and Mathematics (ERCIM)</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2011

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Security and Protection of Information 2011

  • ISBN

    978-80-7231-777-6

  • ISSN

  • e-ISSN

  • Number of pages

    13

  • Pages from-to

    66-78

  • Publisher name

    University of Defence

  • Place of publication

    Brno

  • Event location

    Brno

  • Event date

    Jan 1, 2011

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article