The browser you are using is not supported by this website. All versions of Internet Explorer are no longer supported, either by us or Microsoft (read more here: https://www.microsoft.com/en-us/microsoft-365/windows/end-of-ie-support).

Please use a modern browser to fully experience our website, such as the newest versions of Edge, Chrome, Firefox or Safari etc.

Improving the rainbow attack by reusing colours

Author

Editor

  • Juan A. Garay
  • Atsuko Miyaji
  • Akira Otsuka

Summary, in English

Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.



This work investigates the possibility of reusing colours, i.e., repeating the reduction functions, in the rainbow attack. We show how this outperforms the Hellman and the rainbow attack in a model of fixed resources. We try to characterize exactly when this improvement appears and in such a case the choice of an optimal number of colours.

Publishing year

2009

Language

English

Pages

362-378

Publication/Series

Cryptology and Network Security/Lecture Notes in Computer Science

Volume

5888

Document type

Conference paper

Publisher

Springer

Topic

  • Electrical Engineering, Electronic Engineering, Information Engineering

Keywords

  • Thin rainbow attack
  • Rainbow attack
  • Hellman attack
  • Time memory trade-off
  • TMTO

Conference name

8th International Conference, CANS 2009

Conference date

2009-12-12 - 2009-12-14

Conference place

Kanazawa, Japan

Status

Published

Research group

  • Crypto and Security

ISBN/ISSN/Other

  • ISSN: 1611-3349
  • ISSN: 0302-9743
  • ISBN: 978-3-642-10432-9