This paper shows how a well-balanced trade-off between a generic workstation and dumb but fast reconfigurable hardware can lead to a more efficient implementation of a cryptanalysis than a full hardware or a full software implementation. A realistic cryptanalysis of the A5/1 GSM stream cipher is presented as an illustration of such trade-off. We mention that our cryptanalysis requires only a minimal amount of cipher output and cannot be compared to the attack recently announced by Alex Biryukov, Adi Shamir and David Wagner[2]. © Springer-Verlag Berlin Heidelberg 2000.
CITATION STYLE
Pornin, T., & Stern, J. (2000). Software-hardware trade-offs: Application to A5/1 cryptanalysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 318–327). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_25
Mendeley helps you to discover research relevant for your work.