BOOKS - PROGRAMMING - Parallel Cryptanalysis
US $7.66
606218
606218
Parallel Cryptanalysis
Author: Ruben Niederhagen
Year: 2012
Number of pages: 125
Format: PDF
File size: 0,8 MB.
Language: ENG
Year: 2012
Number of pages: 125
Format: PDF
File size: 0,8 MB.
Language: ENG
Most of today’s cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time. Each cryptographic primitive should be designed such that the cost of an attack grows exponentially with the problem size, while the computations using the secret key only grow polynomially. To estimate the strength of a cryptographic primitive it is important to know how hard it is to perform the computation without knowledge of the secret back door and to get an understanding of how much money or time the attacker has to spend. Usually a cryptographic primitive allows the cryptographer to choose parameters that make an attack harder at the cost of making the computations using the secret key harder as well. Therefore designing a cryptographic primitive imposes the dilemma of choosing the parameters strong enough to resist an attack up to a certain cost while choosing them small enough to allow usage of the primitive in the real world, e.g. on small computing devices like smart phones.