CryptoDB

Paper: Rediscovery of Time Memory Tradeoffs

Authors: Jin Hong Palash Sarkar URL: http://eprint.iacr.org/2005/090 Search ePrint Search Google Some of the existing time memory tradeoff attacks (TMTO) on specific systems can be reinterpreted as methods for inverting general oneway functions. We apply these methods back to specific systems in ways not considered before. This provides the following startling results. No streamcipher can provide security equal to its key length; some important blockcipher modes of operations are vulnerable to TMTO; and no hash function can provide preimage resistance equal to its digest length.
BibTeX
@misc{eprint-2005-12427,