Skip to main content

A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers

  • Conference paper
  • 815 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4263))

Abstract

In this study, we present a novel technique which can speed up the internal state reversion part of time-memory trade-off attacks on binary additive stream ciphers at the expense of requiring more pre-computational time. The technique also solves the difficulties that an attacker may face through running some stream generators backwards.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  2. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, New York (1996)

    Google Scholar 

  3. Babbage, S.: A Space/Time Trade-Off in Exhaustive Search Attacks on Stream Ciphers. In: European Convention on Security and Detection IEE Conference Publication, vol. 408 (1995)

    Google Scholar 

  4. Golic, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)

    Google Scholar 

  5. Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Trade-Offs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Trans. Inform. Theory 26, 525–530 (1980)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Erguler, I., Anarim, E. (2006). A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers. In: Levi, A., Savaş, E., Yenigün, H., Balcısoy, S., Saygın, Y. (eds) Computer and Information Sciences – ISCIS 2006. ISCIS 2006. Lecture Notes in Computer Science, vol 4263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11902140_95

Download citation

  • DOI: https://doi.org/10.1007/11902140_95

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47242-1

  • Online ISBN: 978-3-540-47243-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics