Presentation 2009-02-28
A Theoretical Consideration about Table Lookup Cryptanalysis Method and Its Countermeasure
Kazuho KAKIWAKI, Munetoshi IWAKIRI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Table lookup is an usual cryptanalysis method for brute force attack, its procedure is composed of table build and key search. The search table build process is especially aimed to reduce the key decording time according to the time/memory trade off. In general, the search table for cryptanalysis is very large, therefore the table is summarized by linear correlation of input sequence, and all records are sorted for efficient retrieve by order of a key element. However, actual memory for search table is limited by computing system scale, thus the size of key space for cryptanalysis is not infinite. In this study, we have tried to flood the memory of search table with enlarged key space. This report presents a key space expansion method by automated reconstruct function in random number generator of modified TOYOCRYPT, destribes some theoretical evaluation results about simple experimental models.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Time/memory/data Tradeoff / Symmetric key cryptosystem / TOYOCRYPT
Paper # NLP2008-136
Date of Issue

Conference Information
Committee NLP
Conference Date 2009/2/21(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Nonlinear Problems (NLP)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Theoretical Consideration about Table Lookup Cryptanalysis Method and Its Countermeasure
Sub Title (in English)
Keyword(1) Time/memory/data Tradeoff
Keyword(2) Symmetric key cryptosystem
Keyword(3) TOYOCRYPT
1st Author's Name Kazuho KAKIWAKI
1st Author's Affiliation Department of Computer Science, National Defense Academy()
2nd Author's Name Munetoshi IWAKIRI
2nd Author's Affiliation Department of Computer Science, National Defense Academy
Date 2009-02-28
Paper # NLP2008-136
Volume (vol) vol.108
Number (no) 442
Page pp.pp.-
#Pages 6
Date of Issue