Security

A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms

Download Now Free registration required

Executive Summary

Analyses of three major time memory tradeoff algorithms were presented by a recent paper in such a way that facilitates comparisons of the algorithm performances at arbitrary choices of the algorithm parameters. The algorithms considered there were the classical Hellman tradeoff and the non-perfect table versions of the distinguished point method and the rainbow table method. This paper adds the perfect table versions of the distinguished point method and the rainbow table method to the list, so that all the major tradeoff algorithms may now be compared against each other. The algorithm performance information provided by this and the preceding paper is aimed at making practical comparisons possible.

  • Format: PDF
  • Size: 413.5 KB