Paper 2005/090
Rediscovery of Time Memory Tradeoffs
Jin Hong and Palash Sarkar
Abstract
Some of the existing time memory tradeoff attacks (TMTO) on specific systems can be reinterpreted as methods for inverting general oneway functions. We apply these methods back to specific systems in ways not considered before. This provides the following startling results. No streamcipher can provide security equal to its key length; some important blockcipher modes of operations are vulnerable to TMTO; and no hash function can provide preimage resistance equal to its digest length.
Metadata
- Available format(s)
- PDF PS
- Category
- Foundations
- Publication info
- Published elsewhere. Presented at Asiacrypt 2005 (LNCS 3788, pp. 353-372)
- Keywords
- time memory tradeoff
- Contact author(s)
- jinhong @ snu ac kr
- History
- 2008-08-01: last of 3 revisions
- 2005-03-25: received
- See all versions
- Short URL
- https://ia.cr/2005/090
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/090, author = {Jin Hong and Palash Sarkar}, title = {Rediscovery of Time Memory Tradeoffs}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/090}, year = {2005}, url = {https://eprint.iacr.org/2005/090} }