Abstract | ||
---|---|---|
In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits and apply the meet-in-the-middle attack on multiple ciphertexts. The second attack (TMTO-MTM) is derived from applying the time-memory trade-off attack to the meet-in-the-middle attack on a single ciphertext. We may also use rainbow chains in the table construction to get the Rainbow-MTM attack. The fourth attack (BS-MTM) is defined by combining the time-memory-data trade-off attack proposed by Biryukov and Shamir to the meet-in-the-middle attack on multiple ciphertexts. Lastly, for the final attack (TMD-MTM), we apply the TMTO-Data curve, which demonstrates the general methodology for multiple data trade-offs, to the meet-in-the-middle attack. GDD-MTM requires no pre-processing, but the attack complexity is high while memory requirement is low. In the last four attacks, pre-processing is required but we can achieve lower (faster) online attack complexity at the expense of more memory in comparison with the GDD-MTM attack. To illustrate how the attacks may be used, we applied them in the cryptanalysis of triple DES. In particular, for the BS-MTM attack, we managed to achieve pre-computation and data complexity which are much lower while maintaining almost the same memory and online attack complexity, as compared to a time-memory-data trade-off attack by Biryukov et al. at SAC 2005. In all, our new methodologies offer viable alternatives and provide more flexibility in achieving time-memory-data trade-offs. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-88625-9_11 | IACR Cryptology ePrint Archive |
Keywords | DocType | Volume |
time-memory-data trade-off,meet-in-the-middle,new attack,bs-mtm attack,attack complexity,time-memory-data trade- off,rainbow-mtm attack,triple des.,meet-in-the-middle attack,final attack,. block cipher,online attack complexity,time-memory-data trade-off attack,gdd-mtm attack,time-memory trade-off attack,triple des,block cipher,weed management | Conference | 2009 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jiali Choy | 1 | 44 | 4.10 |
Khoongming Khoo | 2 | 250 | 23.29 |
Chuan-Wen Loe | 3 | 18 | 3.57 |