Published in

Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12

DOI: 10.1145/2414456.2414466

Links

Tools

Export citation

Search in Google Scholar

New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers

Proceedings article published in 2012 by Khoongming Khoo, Chik How Tan
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

In this paper, we introduce a new time-memory-data trade-off attack which can perform better than existing ones by Biryukov-Shamir (BS-TMD [1]), Hong-Sarkar (HS-TMD [8]) and Dunkelman-Keller (DK-TMD [5]). Current Estream ciphers are resistant to these attacks because the state size is too big for the BS-TMD attack, while the pre-processing is at least as expensive as exhaustive search for the HS-TMD and DK-TMD attacks.