In this paper, we present a rigorous evaluation of Thing and Ying's attack (TY attack) [11] along with practical implementations. We find that the cryptanalysis time of their attack is too high to be practical. We also propose a more general time memory trade-off by combining the distinguished points strategy with TY attack. Both theoretical analysis and experimental results show that our new design can save about 53.7% cryptanalysis time compared to TY attack and can reduce about 35.2% storage requirement compared to the original rainbow attack. © 2012 Springer-Verlag.
CITATION STYLE
Li, Z., Lu, Y., Wang, W., Zhang, B., & Lin, D. (2012). A new variant of time memory trade-off on the improvement of Thing and Ying’s attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7618 LNCS, pp. 311–320). https://doi.org/10.1007/978-3-642-34129-8_28
Mendeley helps you to discover research relevant for your work.