Better price-performance ratios for generalized birthday attacks
نویسنده
چکیده
Fix i and k with k = 2i−1. This paper presents a generalizedbirthday attack that uses a machine of size 2 for time 2 to find (m1, . . . , mk) such that f1(m1) + · · ·+ fk(mk) mod 2 = 0. The exponents 2/(2i + 1) and 1/(2i + 1) are smaller than the exponents for Wagner’s original generalized-birthday attack. The improved attack also allows a linear tradeoff between time and success probability, and an ith-power tradeoff between machine size and success probability.
منابع مشابه
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper presents details of a parallel implementation attacking FSB48, a scaled-down version of FSB proposed by the FSB submitters. The implementation runs on a cluster of 8 PCs, each with only 8GB of RAM and 700GB of disk. Th...
متن کاملFSBday: Implementing Wagner’s generalized birthday attack against the SHA-3⋆ round-1 candidate FSB
This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper presents details of a parallel implementation attacking FSB48, a scaled-down version of FSB proposed by the FSB submitters. The implementation runs on a cluster of 8 PCs, each with only 8GB of RAM and 700GB of disk. Th...
متن کاملFSBday: Implementing Wagner’s generalized birthday attack against the SHA-3⋆ candidate FSB
The hash function FSB is one of the candidates submitted to NIST’s competition to find the new standard hash function, SHA-3. The compression function of FSB is based on error correcting codes. In this paper we show how to use Wagner’s generalized birthday attack to find collisions in FSB’s compression function. In particular, we present details on our implementation attacking FSB48, a toy vers...
متن کاملComparing the performance of GARCH (p,q) models with different methods of estimation for forecasting crude oil market volatility
The use of GARCH models to characterize crude oil price volatility is widely observed in the empirical literature. In this paper the efficiency of six univariate GARCH models and two methods of estimation the parameters for forecasting oil price volatility are examined and the best method for forecasting crude oil price volatility of Brent market is determined. All the examined models in this p...
متن کاملImproving the efficiency of Generalized Birthday Attacks against certain structured cryptosystems
1 Technische Universität Darmstadt Fachbereich Informatik, Kryptographie und Computeralgebra, 10 Hochschulstraße, 64289 Darmstadt, Germany {rniebuhr,buchmann}@cdc.informatik.tu-darmstadt.de 2 CASED – Center for Advanced Security Research Darmstadt, 32 Mornewegstrasse, 64293 Darmstadt, Germany [email protected] Abstract. Code-based cryptographic schemes are promising candidates for po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007