Table of contents

  • This session has been presented November 29, 2013.

Description

  • Speaker

    Gildas Avoine - IRISA

Cryptanalytic time-memory trade-offs were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems. A major advance was presented at Crypto 2003 by Oechslin, with the rainbow tables that outperform Hellman's seminal work. After introducing the cryptanalytic time-memory trade-offs, we will present in this talk a new variant of tables, known as fingerprint tables, which drastically reduce the number of false alarms during the attack compared to the rainbow tables. The key point of the technique consists in storing in the tables the fingerprints of the chains instead of their endpoints.<br/> The fingerprint tables provide a time-memory trade-off that is about two times faster than the rainbow tables on usual problem sizes. We will illustrate the performance of the fingerprint tables by cracking Windows NTLM Hash Passwords.

Next sessions

  • Oblivious Transfer from Zero-Knowledge Proofs (or how to achieve round-optimal quantum Oblivious Transfer without structure)

    • June 06, 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Léo Colisson - Université Grenoble Alpes

    We provide a generic construction to turn any classical Zero-Knowledge (ZK) protocol into a composable oblivious transfer (OT) protocol (the protocol itself involving quantum interactions), mostly lifting the round-complexity properties and security guarantees (plain-model/statistical security/unstructured functions…) of the ZK protocol to the resulting OT protocol. Such a construction is unlikely[…]
    • Cryptography

Show previous sessions