Improved time-memory trade-offs with multiple data
In this paper we study time/memory/data trade-off attacks from two points of view. We show
that Time-Memory trade-off (TMTO) by Hellman may be extended to Time/Memory/Key trade-
off. For example, AES with 128-bit key has only 85-bit security if 2 43 encryptions of an
arbitrary fixed text under different keys are available to the attacker. Such attacks are generic
and are more practical than some recent high complexity chosen related-key attacks on
round-reduced versions of AES. They constitute a practical threat for any cipher with 80-bit …
that Time-Memory trade-off (TMTO) by Hellman may be extended to Time/Memory/Key trade-
off. For example, AES with 128-bit key has only 85-bit security if 2 43 encryptions of an
arbitrary fixed text under different keys are available to the attacker. Such attacks are generic
and are more practical than some recent high complexity chosen related-key attacks on
round-reduced versions of AES. They constitute a practical threat for any cipher with 80-bit …
以上显示的是最相近的搜索结果。 查看全部搜索结果