How to Handle Rainbow Tables with External Memory
@inproceedings{Avoine2017HowTH, title={How to Handle Rainbow Tables with External Memory}, author={Gildas Avoine and Xavier Carpent and Barbara Kordy and Florent Tardif}, booktitle={ACISP}, year={2017} }
A cryptanalytic time-memory trade-off is a technique that aims to reduce the time needed to perform an exhaustive search. Such a technique requires large-scale precomputation that is performed once for all and whose result is stored in a fast-access internal memory. When the considered cryptographic problem is overwhelmingly-sized, using an external memory is eventually needed, though. In this paper, we consider the rainbow tables – the most widely spread version of time-memory trade-offs. The…
2 Citations
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018
It is shown that Hellman’s original tradeoff method and the Biryukov-Shamir attack on stream ciphers, which incorporates data into the tradeoff, can be effectively distributed to reduce both time and memory, while other approaches are less advantaged in a distributed approach.
References
SHOWING 1-10 OF 28 REFERENCES
Optimal Storage for Rainbow Tables
- Computer ScienceICISC
- 2013
This paper analytically describes how rainbow tables are currently stored, and a new structure is introduced that considerably reduces the memory requirement, and mathematically analyze these techniques, provide optimal parameterization, and show that the structure is extremely close to the theoretical lower bound.
Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses
- Computer ScienceAsiaCCS
- 2017
It is demonstrated in this paper that rainbow tables are underexploited due to this assumption never being challenged, and an algorithm to calculate the optimal configuration and a decision function to visit the tables is provided.
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
- Computer ScienceTSEC
- 2008
This work introduces a new technique based on checkpoints that still reduces the cryptanalysis time by ruling out false alarms probabilistically and establishes its efficiency when applied on rainbow tables.
Analysis of the Rainbow Tradeoff Algorithm Used in Practice
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2013
This work provides a full analysis of the rainbow tradeoff algorithm that is used in practice, and is able to provide tradeoff parameters that optimize the wall-clock time.
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints
- Computer ScienceINDOCRYPT
- 2005
This paper presents a method of detection of false alarms which significantly reduces the cryptanalysis time while using a minute amount of memory, and presents theoretical analysis of time-memory trade-offs, and gives a complete characterization of the variant based on rainbow tables.
Making a Faster Cryptanalytic Time-Memory Trade-Off
- Computer ScienceCRYPTO
- 2003
A new way of precalculating the data is proposed which reduces by two the number of calculations needed during cryptanalysis and it is shown that the gain could be even much higher depending on the parameters used.
New Applications of Time Memory Data Tradeoffs
- Computer Science, MathematicsASIACRYPT
- 2005
This paper focuses on identifying candidate oneway functions hidden in cryptographic algorithms, inverting which will result in breaking the algorithm, and provides some new applications of TMTO and a set of general guidelines for applying TMTO attacks.
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2008
A new variant of the DP technique, named variable DP (VDP), having properties very different from DP, has an effect on the amount of memory required to store the pre-computed tables.
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation
- Computer Science, MathematicsFPL
- 2002
The experimental results for the cryptanalysis of DES that are presented are based on a time-memory tradeoff using distinguished points, a method which is referenced to Rivest [2].
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions
- Computer ScienceESORICS
- 2015
This paper introduces an efficient construction that consists in partitioning the search set into subsets of close densities, and a strategy to explore the TMTOs associated to the subsets based on an interleaved traversal that results in a significant improvement compared to currently usedTMTOs.