The cost of false alarms in Hellman and rainbow tradeoffs
نویسنده
چکیده
Cryptanalytic time memory tradeoff algorithms are generic one-way function inversion techniques that utilize pre-computation. Even though the online time complexity is known up to a small multiplicative factor for any tradeoff algorithm, false alarms pose a major obstacle in its accurate assessment. In this work, we study the expected pre-image size for an iteration of functions and use the result to analyze the cost incurred by false alarms. We are able to present the expected online time complexities for the Hellman tradeoff and the rainbow table method in a manner that takes false alarms into account. We also analyze the effects of the checkpoint method in reducing false alarm costs. The ability to accurately compute the online time complexities will allow one to choose their tradeoff parameters more optimally, before starting the expensive precomputation process.
منابع مشابه
Economic- Statistical design of T2 control chart with the VSSC scheme
T2 control charts are used to monitor a process when more than one quality variable associated with process is being observed. Recent studies have shown that using variable sample size (VSS) schemes result in charts with more statistical power when detecting small to moderate shifts in the process mean vector. This paper presents an economic- statistical design of T2 control charts with variabl...
متن کاملDiscarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster
Cryptanalytic time-memory trade-offs were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems. A major advance was presented at Crypto 2003 by Oechslin, with the rainbow table variant that outperforms Hellman’s seminal work. This paper introduces the fingerprint tables, which drastically reduce the number of false alarms during the attack compared to the rain...
متن کاملA Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
The performances of three major time memory tradeoff algorithms were compared in a recent paper. The algorithms considered there were the classical Hellman tradeoff and the non-perfect table versions of the distinguished point method and the rainbow table method. This paper adds the perfect table versions of the distinguished point method and the rainbow table method to the list, so that all th...
متن کاملBias and Unbias Comparison between Economic Statistical Design T2-VSI and T2-FRS Control Charts
The Hotelling's control chart, is the most widely used multivariate procedure for monitoring two or more related quality characteristics, but it’s power lacks the desired performance in detecting small to moderate shifts. Recently, the variable sampling intervals (VSI) control scheme in which the length of successive sampling intervals is determined upon the preceding values has been proved t...
متن کاملHigh-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System
The computing power of graphics processing units (GPU) has increased rapidly, and there has been extensive research on generalpurpose computing on GPU (GPGPU) for cryptographic algorithms such as RSA, ECC, NTRU, and AES. With the rise of GPGPU, commodity computers have become complex heterogeneous GPU+CPU systems. This new architecture poses new challenges and opportunities in highperformance c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008