A study of time-memory trade-off cryptanalysis for block ciphers タイム・メモリー・トレードオフ暗号強度評価法の研究
この論文にアクセスする
この論文をさがす
著者
書誌事項
- タイトル
-
A study of time-memory trade-off cryptanalysis for block ciphers
- タイトル別名
-
タイム・メモリー・トレードオフ暗号強度評価法の研究
- 著者名
-
金, 逸俊
- 著者別名
-
キム, イルジュン
- 学位授与大学
-
横浜国立大学
- 取得学位
-
博士(工学)
- 学位授与番号
-
甲第348号
- 学位授与年月日
-
1999-03-25
注記・抄録
博士論文
目次
- Abstract / p4 (0007.jp2)
- Introduction / p1 (0016.jp2)
- contents / p6 (0009.jp2)
- contents of figure / p9 (0012.jp2)
- contents of table / p11 (0014.jp2)
- 1 Introduction / p1 (0016.jp2)
- 2 Cryptosystem and Scope of Cryptanalysis / p4 (0019.jp2)
- 2.1 Dishonest Acts and Countermeasures / p4 (0019.jp2)
- 2.2 Cryptosystem Basics / p5 (0020.jp2)
- 2.3 Cryptanalysis / p8 (0023.jp2)
- 2.4 Operating Modes / p10 (0025.jp2)
- 2.5 Relation Between Operating Modes and Attacks / p13 (0028.jp2)
- 3 Major Cryptanlaysis of Brute Force Method / p15 (0030.jp2)
- 3.1 Exhaustive Search / p15 (0030.jp2)
- 3.2 Table look up attack / p18 (0033.jp2)
- 3.3 Time-Memory Trade-Off Crypanalysis / p18 (0033.jp2)
- 3.4 Major Features among Cryptanalysis of Brute Force Method / p23 (0038.jp2)
- 4 Analysis of TMTO for Implementation / p25 (0040.jp2)
- 4.1 Realization of Reducing Space Complexity upto 50% comparing with the Hellman / p25 (0040.jp2)
- 4.2 Adjustment Function R / p29 (0044.jp2)
- 4.3 A New Modified Enciphering Function [数式] / p38 (0053.jp2)
- 4.4 Summary Consideration / p40 (0055.jp2)
- 5 Choosing Parameters for Achieving Higher Success Probability in TMTO / p41 (0056.jp2)
- 5.1 Success Probability and Complexity / p42 (0057.jp2)
- 5.2 Estimation of Success Probability and Key-Searching Time between κ=1 and κ=[数式] / p48 (0063.jp2)
- 5.3 Summary Consideration / p53 (0068.jp2)
- 6 Evaluation of DES by TMTO with Hashing / p54 (0069.jp2)
- 6.1 Key Searching by Hashing / p54 (0069.jp2)
- 6.2 Performance Evaluation for DES based on hashing / p64 (0079.jp2)
- 6.3 Summary Conclusion / p70 (0085.jp2)
- 7 On the Multiple Linear Approximation Attack in Linear Cryptanalysis for DES / p72 (0087.jp2)
- 7.1 Linear Crypanalysis / p73 (0088.jp2)
- 7.2 Linear Sieve Method / p75 (0090.jp2)
- 7.3 Attacks using Multiple Linear Approximation / p76 (0091.jp2)
- 7.4 Comparison of Linear Approximation and Linear Sieve Approximation / p78 (0093.jp2)
- 7.5 Summary Consideration / p85 (0100.jp2)
- 8 Conclusion / p86 (0101.jp2)
- Bibliography / p88 (0103.jp2)
- Published Papers / p93 (0108.jp2)