Parallel collision search with cryptanalytic applications

被引:319
作者
van Oorschot, PC [1 ]
Wiener, MJ [1 ]
机构
[1] Entrust Technol, Ottawa, ON K1V 1A7, Canada
关键词
parallel collision search; cryptanalysis; discrete logarithm; hash collision; meet-in-the-middle attack; double encryption; elliptic curves;
D O I
10.1007/PL00003816
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A simple new technique of parallelizing methods for solving search problems which seek collisions in pseudorandom walks is presented. This technique can be adapted to a wide range of cryptanalytic problems which can be reduced to finding collisions. General constructions are given showing how to adapt the technique to finding discrete logarithms in cyclic groups, finding meaningful collisions in hash functions, and performing meet-in-the-middle attacks such as a known-plaintext attack on double encryption. The new technique greatly extends the reach of practical attacks, providing the most cost-effective means known to date for defeating: the small subgroup used in certain schemes based on discrete logarithms such as Schnorr, DSA, and elliptic curve cryptosystems; hash functions such as MD5, RIPEMD, SHA-1, MDC-2, and MDC-4; and double encryption and three-key triple encryption. The practical significance of the technique is illustrated by giving the design for three $10 million custom machines which could be built with current technology: one finds elliptic curve logarithms in GF(2(155)) thereby defeating a proposed elliptic curve cryptosystem in expected time 32 days, the second finds MD5 collisions in expected time 21 days, and the last recovers a double-DES key from two known plaintexts in expected time 4 years, which is four orders of magnitude faster than the conventional meet-in-the-middle attack on double-DES. Based an this attack. double-DES offers only 17 more bits of security than single-DES.
引用
收藏
页码:1 / 28
页数:28
相关论文
共 46 条
[1]   AN IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOSYSTEMS OVER F(2)155 [J].
AGNEW, GB ;
MULLIN, RC ;
VANSTONE, SA .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :804-813
[2]  
AGNEW GB, LECT NOTES COMPUTER, V658, P482
[3]   TIME MEMORY PROCESSOR TRADE-OFFS [J].
AMIRAZIZI, HR ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1988, 34 (03) :505-512
[4]   TOWARD A THEORY OF POLLARD RHO METHOD [J].
BACH, E .
INFORMATION AND COMPUTATION, 1991, 90 (02) :139-155
[5]  
BLAKE IF, 1979, INTRO APPL PROBABILT
[6]  
Bosselaers Antoon, 1995, Lecture Notes in Computer Science, V1007
[7]  
Brent R. P., 1980, BIT (Nordisk Tidskrift for Informationsbehandling), V20, P176, DOI 10.1007/BF01933190
[8]  
CAMPBELL KW, LECT NOTES COMPUTER, V740, P512
[9]  
DENNING DE, 1982, CRYTOGRAPHY DATA SEC
[10]   EXHAUSTIVE CRYPT-ANALYSIS OF NBS DATA ENCRYPTION STANDARD [J].
DIFFIE, W ;
HELLMAN, ME .
COMPUTER, 1977, 10 (06) :74-84