The cost of false alarms in Hellman and rainbow tradeoffs

نویسنده

  • Jin Hong
چکیده

Cryptanalytic time memory tradeoff algorithms are generic one-way function inversion techniques that utilize pre-computation. Even though the online time complexity is known up to a small multiplicative factor for any tradeoff algorithm, false alarms pose a major obstacle in its accurate assessment. In this work, we study the expected pre-image size for an iteration of functions and use the result to analyze the cost incurred by false alarms. We are able to present the expected online time complexities for the Hellman tradeoff and the rainbow table method in a manner that takes false alarms into account. We also analyze the effects of the checkpoint method in reducing false alarm costs. The ability to accurately compute the online time complexities will allow one to choose their tradeoff parameters more optimally, before starting the expensive precomputation process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Economic- Statistical design of T2 control chart with the VSSC scheme

T2 control charts are used to monitor a process when more than one quality variable associated with process is being observed. Recent studies have shown that using variable sample size (VSS) schemes result in charts with more statistical power when detecting small to moderate shifts in the process mean vector. This paper presents an economic- statistical design of T2 control charts with variabl...

متن کامل

Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster

Cryptanalytic time-memory trade-offs were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems. A major advance was presented at Crypto 2003 by Oechslin, with the rainbow table variant that outperforms Hellman’s seminal work. This paper introduces the fingerprint tables, which drastically reduce the number of false alarms during the attack compared to the rain...

متن کامل

A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms

The performances of three major time memory tradeoff algorithms were compared in a recent paper. The algorithms considered there were the classical Hellman tradeoff and the non-perfect table versions of the distinguished point method and the rainbow table method. This paper adds the perfect table versions of the distinguished point method and the rainbow table method to the list, so that all th...

متن کامل

Bias and Unbias Comparison between Economic Statistical Design T2-VSI and T2-FRS Control Charts

The Hotelling's  control chart, is the most widely used multivariate procedure for monitoring  two or more related quality characteristics, but it’s power lacks the desired performance in detecting small to moderate shifts. Recently, the variable sampling intervals (VSI) control scheme in which the length of successive sampling intervals is determined upon the preceding values has been proved t...

متن کامل

High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System

The computing power of graphics processing units (GPU) has increased rapidly, and there has been extensive research on generalpurpose computing on GPU (GPGPU) for cryptographic algorithms such as RSA, ECC, NTRU, and AES. With the rise of GPGPU, commodity computers have become complex heterogeneous GPU+CPU systems. This new architecture poses new challenges and opportunities in highperformance c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008