Paper 2005/090

Rediscovery of Time Memory Tradeoffs

Jin Hong and Palash Sarkar

Abstract

Some of the existing time memory tradeoff attacks (TMTO) on specific systems can be reinterpreted as methods for inverting general oneway functions. We apply these methods back to specific systems in ways not considered before. This provides the following startling results. No streamcipher can provide security equal to its key length; some important blockcipher modes of operations are vulnerable to TMTO; and no hash function can provide preimage resistance equal to its digest length.

Metadata
Available format(s)
PDF PS
Category
Foundations
Publication info
Published elsewhere. Presented at Asiacrypt 2005 (LNCS 3788, pp. 353-372)
Keywords
time memory tradeoff
Contact author(s)
jinhong @ snu ac kr
History
2008-08-01: last of 3 revisions
2005-03-25: received
See all versions
Short URL
https://ia.cr/2005/090
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/090,
      author = {Jin Hong and Palash Sarkar},
      title = {Rediscovery of Time Memory Tradeoffs},
      howpublished = {Cryptology ePrint Archive, Paper 2005/090},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/090}},
      url = {https://eprint.iacr.org/2005/090}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.