Presentation | 2009-02-28 A Theoretical Consideration about Table Lookup Cryptanalysis Method and Its Countermeasure Kazuho KAKIWAKI, Munetoshi IWAKIRI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Table lookup is an usual cryptanalysis method for brute force attack, its procedure is composed of table build and key search. The search table build process is especially aimed to reduce the key decording time according to the time/memory trade off. In general, the search table for cryptanalysis is very large, therefore the table is summarized by linear correlation of input sequence, and all records are sorted for efficient retrieve by order of a key element. However, actual memory for search table is limited by computing system scale, thus the size of key space for cryptanalysis is not infinite. In this study, we have tried to flood the memory of search table with enlarged key space. This report presents a key space expansion method by automated reconstruct function in random number generator of modified TOYOCRYPT, destribes some theoretical evaluation results about simple experimental models. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Time/memory/data Tradeoff / Symmetric key cryptosystem / TOYOCRYPT |
Paper # | NLP2008-136 |
Date of Issue |
Conference Information | |
Committee | NLP |
---|---|
Conference Date | 2009/2/21(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Nonlinear Problems (NLP) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Theoretical Consideration about Table Lookup Cryptanalysis Method and Its Countermeasure |
Sub Title (in English) | |
Keyword(1) | Time/memory/data Tradeoff |
Keyword(2) | Symmetric key cryptosystem |
Keyword(3) | TOYOCRYPT |
1st Author's Name | Kazuho KAKIWAKI |
1st Author's Affiliation | Department of Computer Science, National Defense Academy() |
2nd Author's Name | Munetoshi IWAKIRI |
2nd Author's Affiliation | Department of Computer Science, National Defense Academy |
Date | 2009-02-28 |
Paper # | NLP2008-136 |
Volume (vol) | vol.108 |
Number (no) | 442 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |