On the Complexity of Implementation Some Cryptanalysis Methods by Distributed Computing
The subject of the research is an investigation on the distributed computing efficiency in the analysis of cryptographic systems by different key search methods: meet-in-the-middle, sequential key search and Hellman method. The leading results of the research are presented in the paper.
Main Authors: | A. A. Varfolomeev, K.G. Kogos, A. M. Koreneva, V. M. Fomichev |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2011-12-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/578 |
Similar Items
-
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis
by: Nyberg, K.
Published: (2021) -
Improved Cryptanalysis of Reduced-Version QARMA-64/128
by: Ya Liu, et al.
Published: (2020-01-01) -
Cryptanalysis of GOST2
by: Tomer Ashur, et al.
Published: (2017-03-01) -
Differential Cryptanalysis of Round-Reduced LEA
by: Ashutosh Dhar Dwivedi, et al.
Published: (2018-01-01) -
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
by: Thorsten Kranz, et al.
Published: (2017-03-01)