Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack


In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits and apply the meet-in-the-middle attack on multiple ciphertexts. The second attack (TMTO-MTM) is derived from applying the time-memory trade-off attack to the… (More)
DOI: 10.1007/978-3-540-88625-9_11


1 Figure or Table

Slides referencing similar topics