2011
DOI: 10.1007/978-3-642-25578-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Parallel Distinguished Point Tradeoff

Abstract: Abstract. Cryptanalytic time memory tradeoff algorithms are tools for quickly inverting one-way functions and many consider the rainbow table method to be the most efficient tradeoff algorithm. However, it was recently announced, mostly based on experiments, that the parallelization of the perfect distinguished point tradeoff algorithm brings about an algorithm that is 50% more efficient than the perfect rainbow table method. Motivated by this claim, we provide an accurate theoretic analysis of the parallel ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Recall from [18,20] that the number of distinct entries |DM| contained in a non-perfect DP matrix satisfies…”
Section: Propositionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recall from [18,20] that the number of distinct entries |DM| contained in a non-perfect DP matrix satisfies…”
Section: Propositionmentioning
confidence: 99%
“…In the case of the DP tradeoff, the cost of resolving alarms can be reduced slightly [18] through the online chain record (OCR) technique [17,24]. The method is to keep a full record of the online chain during its generation, so that any pre-computation chain regeneration can be stopped at the exact point of merge, rather than at the terminating DP.…”
Section: ⊓ ⊔mentioning
confidence: 99%
“…The attack can be carried out quickly, but a large amount of memory is needed to store all precomputed values. Cryptanalytic time‐memory trade‐offs are compromise solutions between time and memory. Cryptanalytic time‐memory trade‐off was introduced by Hellman in 1980 .…”
Section: Introductionmentioning
confidence: 99%
“…In 2010, Jin Hong et al established a theoretical framework of analyzing false alarms [8] and gave a fair comparison of existing tradeoff algorithms [10]. Related works include the analysis of parallel distinguished point tradeoff [9], non-perfect table fuzzy rainbow tradeoff [11], perfect rainbow tradeoff [13] etc.. Analysis of one checkpoint for a single nonperfect rainbow table was done also in [8].…”
Section: Introductionmentioning
confidence: 99%