Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014 (2014), Article ID 765394, 19 pages
http://dx.doi.org/10.1155/2014/765394
Research Article

Analysis of the Perfect Table Fuzzy Rainbow Tradeoff

Department of Mathematical Sciences and ISaC, Seoul National University, Seoul 151-747, Republic of Korea

Received 23 January 2014; Accepted 15 April 2014; Published 12 June 2014

Academic Editor: Igor Andrianov

Copyright © 2014 Byoung-Il Kim and Jin Hong. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. E. Hellman, “A cryptanalytic time-memory trade-off,” IEEE Transactions on Information Theory, vol. 26, no. 4, pp. 401–406, 1980. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  2. D. E. Denning, Cryptography and Data Security, Addison-Wesley, Reading, Mass, USA, 1982.
  3. P. Oechslin, “Making a faster cryptanalytic time-memory trade-off,” in Advances in Cryptology—CRYPTO 2003, vol. 2729 of Lecture Notes in Computer Science, pp. 617–630, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  4. E. P. Barkan, Cryptanalysis of Ciphers and Protocols [Ph.D. thesis], Technion—Israel Institute of Technology, 2006.
  5. E. Barkan, E. Biham, and A. Shamir, “Rigorous bounds on cryptanalytic time/memory tradeoffs,” in Advances in Cryptology—CRYPTO 2006, vol. 4117 of Lecture Notes in Computer Science, pp. 1–21, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. K. Nohl, “Attacking phone privacy,” in Proceedings of the Black Hat USA, Las Vegas, Nev, USA, July 2010.
  7. K. Nohl and C. Paget, “GSM-SRSLY?” in Proceedings of the 26th Chaos Communication Congress, Berlin, Germany, December 2009.
  8. F. van den Broek and E. Poll, “A comparison of time-memory trade-off attacks on stream ciphers,” in Progress in Cryptology—AFRICACRYPT 2013, vol. 7918 of Lecture Notes in Computer Science, pp. 406–423, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  9. B. I. Kim and J. Hong, “Analysis of the non-perfect table fuzzy rainbow tradeoff,” in Information Security and Privacy, vol. 7959 of Lecture Notes in Computer Science, pp. 347–362, Springer, New York, NY, USA, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  10. A. Biryukov, S. Mukhopadhyay, and P. Sarkar, “Improved time-memory trade-offs with multiple data,” in Selected Areas in Cryptography, vol. 3897 of Lecture Notes in Computer Science, pp. 110–127, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  11. A. Biryukov and A. Shamir, “Cryptanalytic time/memory/data tradeoffs for stream ciphers,” in Advances in Cryptology—ASIACRYPT 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 1–13, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. J. Hong and S. Moon, “A comparison of cryptanalytic tradeoff algorithms,” Journal of Cryptology, vol. 26, no. 4, pp. 559–637, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. G. W. Lee and J. Hong, “A comparison of perfect table cryptanalytic tradeoff algorithms,” Cryptology ePrint Archive 2012/540, 2012. View at Google Scholar
  14. G. Avoine, P. Junod, and P. Oechslin, “Characterization and improvement of time-memory trade-off based on perfect tables,” ACM Transactions on Information and System Security, vol. 11, no. 4, article 17, pp. 1–17, 2008, Preliminary version presented at INDOCRYPT 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Biryukov, A. Shamir, and D. Wagner, “Real time cryptanalysis of A5/1 on a PC,” in Fast Software Encryption, vol. 1978 of Lecture Notes in Computer Science, pp. 1–18, Springer, Berlin, Germany, 2001. View at Google Scholar
  16. J. Borst, Block Ciphers: Design, Analysis, and Side-Channel Analysis [Ph.D. thesis], Katholieke Universiteit Leuven, 2001.
  17. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.-D. Legat, “A time-memory tradeoff using distinguished points: new analysis & FPGA results,” in Cryptographic Hardware and Embedded Systems—CHES 2002, vol. 2523 of Lecture Notes in Computer Science, pp. 593–609, Springer, Berlin, Germany, 2002. View at Google Scholar · View at Zentralblatt MATH
  18. B. I. Kim and J. Hong, “Analysis of the non-perfect table fuzzy rainbow tradeoff,” Cryptology ePrint Archive 2012/612, 2012. View at Google Scholar