Çankaya GCRIS Standart veritabanının içerik oluşturulması ve kurulumu Research Ecosystems (https://www.researchecosystems.com) tarafından devam etmektedir. Bu süreçte gördüğünüz verilerde eksikler olabilir.
 

Choosing parameters to achieve a higher success rate for hellman time memory trade off attack

No Thumbnail Available

Date

2009

Authors

Saran, Nurdan
Doğanaksoy, Ali

Journal Title

Journal ISSN

Volume Title

Publisher

IEEE

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

Research Projects

Organizational Units

Journal Issue

Events

Abstract

In 1980, Hellman proposed the Time Memory Trade Off (TWTO) attack and applied it on block cipher DES (Data Encryption Standard). Time Memory Trade Off attack is one of the methods that inverts a one way function. The resistance to TWO attacks is an important criterion in the design of a modern cipher Unlike the exhaustive search and table lookup methods, TWO is a probabilistic method, that is, the search operation may not find a preimage even if there exists one. Up to now, there are some approximate bounds for success rates of Hellman table by Hellman and Kusuda et al. In this study, we give a more precise approximation for the coverage of a single Hellman table. There is no precise guideline in the literature that points out how to choose parameters for Hellman TWO. We present a detailed analysis of the success rate of Hellman table via new parameters and also show how to choose parameters to achieve a higher success rate. The results are experimentally confirmed. We also discuss the Hellman's TMTO Curve.

Description

Keywords

Symmetric Key Cryptography, Cryptanalysis, Time Memory Trade Off Attack, Success Probability

Turkish CoHE Thesis Center URL

Fields of Science

Citation

Saran, Nurdan; Doğanaksoy, Ali, "Choosing parameters to achieve a higher success rate for hellman time memory trade off attack", 2009 International Conference On Availability, Reliability, And Security (Ares), Vols 1 And 2, (2009).

WoS Q

Scopus Q

Source

2009 International Conference On Availability, Reliability, And Security (Ares), Vols 1 And 2

Volume

Issue

Start Page

End Page