International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Rediscovery of Time Memory Tradeoffs

Authors:
Jin Hong
Palash Sarkar
Download:
URL: http://eprint.iacr.org/2005/090
Search ePrint
Search Google
Abstract: Some of the existing time memory tradeoff attacks (TMTO) on specific systems can be reinterpreted as methods for inverting general oneway functions. We apply these methods back to specific systems in ways not considered before. This provides the following startling results. No streamcipher can provide security equal to its key length; some important blockcipher modes of operations are vulnerable to TMTO; and no hash function can provide preimage resistance equal to its digest length.
BibTeX
@misc{eprint-2005-12427,
  title={Rediscovery of Time Memory Tradeoffs},
  booktitle={IACR Eprint archive},
  keywords={foundations / time memory tradeoff},
  url={http://eprint.iacr.org/2005/090},
  note={ jinhong@etri.re.kr 12865 received 22 Mar 2005},
  author={Jin Hong and Palash Sarkar},
  year=2005
}