the scalability of modern time/memory trade-off tech-
niques on real cryptographic functions.
We have empirically evaluated the performance of
our design and model on a proof-of-concept imple-
mentation, and we have estimated the performance
of attacking two well known ciphers: DES and A5/1.
Our design outperforms previous ones in the literature
by achieving a cracking time under one second with
a 99% accuracy and a 6000e budget, demonstrating
that these two ciphers can be cracked in real time.
Our experience confirms that there is a gap be-
tween the theoretical treatment of time/memory trade-
off algorithms and their practical implementations.
Given the large dimension of the precomputed tables,
it is very important to have a precise external mem-
ory model that allows both to estimate the cost of the
various components and also to parallelize and mod-
ularize the system in the correct way. We have imple-
mented a software tool that can be used to compute
the tradeoff parameters and estimate the performance
of the final system using the external memory model
(Veronese et al., 2021). We hope that our design prin-
ciples and solutions might be useful for the develop-
ment of similar projects in the future.
Finally, we plan to concretely validate the esti-
mated performance figures of DES and A5/1 ciphers
with an actual VHDL design and benchmarking.
ACKNOWLEDGEMENTS
This work has been partially supported by the POR
FESR project SAFE PLACE: “Sistemi IoT per ambi-
enti di vita salubri e sicuri”.
REFERENCES
Barkan, P. (2006). Cryptanalysis of Ciphers and Protocols.
PhD thesis, Israel Institute of Technology.
Egorushkin, M. (2019). Atomic queue. https://github.com/
max0x7ba/atomic queue.
G
¨
uneysu, T., Kasper, T., Novotn
´
y, M., Paar, C., and Rupp,
A. (2008). Cryptanalysis with copacobana. IEEE
Transactions on Computers, 57(11):1498–1513.
Haghighi, M. and Dakhilalian, M. (2014). A practical time
complexity analysis of fuzzy rainbow tradeoff. In
2014 11th International ISC Conference on Informa-
tion Security and Cryptology, pages 39–43.
Hellman, M. E. (1980). A cryptanalytic time-memory trade-
off. IEEE Trans. Inf. Theory, 26(4):401–406.
Kalenderi, M., Pnevmatikatos, D., Papaefstathiou, I., and
Manifavas, C. (2012). Breaking the GSM A5/1 cryp-
tography algorithm with rainbow tables and high-end
FPGAs. In 22nd International Conference on Field
Programmable Logic and Applications (FPL), pages
747–753.
Kim, B.-I. and Hong, J. (2013). Analysis of the non-perfect
table fuzzy rainbow tradeoff. In Boyd, C. and Simp-
son, L., editors, 18th Australasian Conference on In-
formation Security and Privacy, volume 7959, pages
347–362, Berlin, Heidelberg. Springer.
Kim, B.-I. and Hong, J. (2014). Analysis of the perfect table
fuzzy rainbow tradeoff. Journal of Applied Mathemat-
ics, 2014:765394.
Kim, J. W., Hong, J., and Park, K. (2013). Analysis of the
rainbow tradeoff algorithm used in practice. Cryptol-
ogy ePrint Archive, Report 2013/591. https://eprint.
iacr.org/2013/591.
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., and Schimm-
ler, M. (2006). Breaking ciphers with copacobana
–a cost-optimized parallel code breaker. In Goubin,
L. and Matsui, M., editors, Cryptographic Hardware
and Embedded Systems (CHES 2006), pages 101–118.
Springer Berlin Heidelberg.
Lu, J., Li, Z., and Henricksen, M. (2015). Time–
Memory Trade-Off Attack on the GSM A5/1 Stream
Cipher Using Commodity GPGPU. In Malkin, T.,
Kolesnikov, V., Lewko, A. B., and Polychronakis, M.,
editors, Applied Cryptography and Network Security,
pages 350–369, Cham. Springer International Pub-
lishing.
Mentens, N., Batina, L., Preneel, B., and Verbauwhede, I.
(2006). Time-Memory Trade-Off Attack on FPGA
Platforms: UNIX Password Cracking. In Bertels, K.,
Cardoso, J. M. P., and Vassiliadis, S., editors, Recon-
figurable Computing: Architectures and Applications,
pages 323–334. Springer Berlin Heidelberg.
Nohl, K. (2010a). A5/1 decrypt - Back clock-
ing. https://opensource.srlabs.de/projects/a51-
decrypt/wiki/Backclocking.
Nohl, K. (2010b). Attacking phone privacy. Black Hat Lec-
ture Notes USA, page 1–6.
Nohl, K. and Paget, C. (2009). Gsm: Srsly. In 26th Chaos
Communication Congress, volume 8, pages 11–17.
Oechslin, P. (2003). Making a faster cryptanalytic time-
memory trade-off. In Boneh, D., editor, Ad-
vances in Cryptology (CRYPTO 2003), pages 617–
630. Springer Berlin Heidelberg.
Quisquater, J.-J. and Standaert, F.-X. (2005). Exhaus-
tive key search of the des: Updates and refine-
ments. Special-purpose Hardware for Attacking Cryp-
tographic Systems (SHARCS’05).
Quisquater, J.-J., Standaert, F.-X., Rouvroy, G., David, J.-
P., and Legat, J.-D. (2002). A Cryptanalytic Time-
Memory Tradeoff: First FPGA Implementation. In
Field-Programmable Logic and Applications, Recon-
figurable Computing (FL’02), pages 780–789.
Robling Denning, D. E. (1982). Cryptography and Data
Security. Addison-Wesley Longman Publishing Co.,
Inc., USA.
Veronese, L., Palmarini, F., Focardi, R., and Luccio, F. L.
(2021). Parameter calculator and performance evalu-
ator tool. https://github.com/secgroup/fuzzy-rainbow.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
176