2012
DOI: 10.1007/s00145-012-9128-3
|View full text |Cite|
|
Sign up to set email alerts
|

A Comparison of Cryptanalytic Tradeoff Algorithms

Abstract: Three time memory tradeoff algorithms are compared in this paper. Specifically, the classical tradeoff algorithm by Hellman, the distinguished point tradeoff method, and the rainbow table method, in their non-perfect table versions, are treated.We show that, under parameters and assumptions that are typically considered in theoretic discussions of the tradeoff algorithms, Hellman and distinguished point tradeoffs perform very close to each other and that the rainbow table method performs somewhat better than t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
58
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 38 publications
(64 citation statements)
references
References 15 publications
1
58
0
3
Order By: Relevance
“…The two inversion objectives clearly require different amounts of resources to achieve. If applications of the tradeoff technique to password recovery from sufficiently long password hashes are to be considered, the second version is the correct inversion problem to study [11]. In the interest of practical applicability, the current paper deals with the second inversion problem.…”
Section: Preliminariesmentioning
confidence: 99%
See 4 more Smart Citations
“…The two inversion objectives clearly require different amounts of resources to achieve. If applications of the tradeoff technique to password recovery from sufficiently long password hashes are to be considered, the second version is the correct inversion problem to study [11]. In the interest of practical applicability, the current paper deals with the second inversion problem.…”
Section: Preliminariesmentioning
confidence: 99%
“…However, these can be resolved in exactly the same way as with the exiting false alarms. Using the analysis given in [11], one can maintain the side effects of additional false alarms to a manageable level by controlling the degree of truncation. 5.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations