A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers
In this study, we present a novel technique which can speed up the internal state reversion part of time-memory trade-off attacks on binary additive stream ciphers at the expense of requiring more pre-computational time. The technique also solves the difficulties that an attacker may face through running some stream generators backwards.
KeywordsInternal State Lookup Table Stream Cipher Stream Generator Plaintext Attack
Unable to display preview. Download preview PDF.
- 2.Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, New York (1996)Google Scholar
- 3.Babbage, S.: A Space/Time Trade-Off in Exhaustive Search Attacks on Stream Ciphers. In: European Convention on Security and Detection IEE Conference Publication, vol. 408 (1995)Google Scholar
- 4.Golic, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)Google Scholar