Browsing by Author "Doganaksoy, Ali"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Conference Object Citation - WoS: 5Citation - Scopus: 8Choosing parameters to achieve a higher success rate for hellman time memory trade off attack(Ieee, 2009) Saran, Nurdan; Doganaksoy, Ali; 20868In 1980, Hellman proposed the Time Memory Trade Off (TWTO) attack and applied it on block cipher DES (Data Encryption Standard). Time Memory Trade Off attack is one of the methods that inverts a one way function. The resistance to TWO attacks is an important criterion in the design of a modern cipher Unlike the exhaustive search and table lookup methods, TWO is a probabilistic method, that is, the search operation may not find a preimage even if there exists one. Up to now, there are some approximate bounds for success rates of Hellman table by Hellman and Kusuda et al. In this study, we give a more precise approximation for the coverage of a single Hellman table. There is no precise guideline in the literature that points out how to choose parameters for Hellman TWO. We present a detailed analysis of the success rate of Hellman table via new parameters and also show how to choose parameters to achieve a higher success rate. The results are experimentally confirmed. We also discuss the Hellman's TMTO Curve.Conference Object Citation - WoS: 5Citation - Scopus: 11New Distinguishers Based on Random Mappings Against Stream Ciphers(Springer-verlag Berlin, 2008) Turan, Meltem Soenmez; Calik, Cagdas; Saran, Nurdan Buz; Doganaksoy, AliStatistical randomness testing plays an important role in security analysis of cryptosystems. In this study, we aim to propose a new framework of randomness testing based on random mappings. Considering the probability distributions of coverage and P-lengths, we present three new distinguishers; (i) coverage test, (ii) p-test and (iii) DP-coverage test and applied them on Phase III Candidates of eSTREAM project. We experimentally observed some statistical weaknesses of Po-maranch using the coverage test.