Time/memory tradeoffs are techniques used in cryptanalysis to trade increased memory usage with decreased computation time. We consider the fuzzy-rainbow tradeoff, a powerful technique used in 2010 to attack the GSM A5/1 cipher. We extend the focus from the simple model that considers only the main memory usage, to a new, more realistic one that also includes the hierarchical (external) storage. Moreover, as far as we know, existing solutions are only theoretical and do not consider the performance level of real systems. In this paper, we propose a reference hardware and software design for the cryptanalysis of ciphers and one-way functions based on FPGAs, SSDs and the fuzzy rainbow tradeoff algorithm. We evaluate the performance of our design by extending an existing analytical model to account for the actual storage hierarchy, and we estimate an attack time for DES and A5/1 ciphers of less than one second, demonstrating that these ciphers can be cracked in real-time with a budget under 6000€. We finally discuss possible refinements to the model and to the hardware design that could be helpful in practice.

Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs

Veronese L.;Palmarini F.;Focardi R.;Luccio F. L.
2023-01-01

Abstract

Time/memory tradeoffs are techniques used in cryptanalysis to trade increased memory usage with decreased computation time. We consider the fuzzy-rainbow tradeoff, a powerful technique used in 2010 to attack the GSM A5/1 cipher. We extend the focus from the simple model that considers only the main memory usage, to a new, more realistic one that also includes the hierarchical (external) storage. Moreover, as far as we know, existing solutions are only theoretical and do not consider the performance level of real systems. In this paper, we propose a reference hardware and software design for the cryptanalysis of ciphers and one-way functions based on FPGAs, SSDs and the fuzzy rainbow tradeoff algorithm. We evaluate the performance of our design by extending an existing analytical model to account for the actual storage hierarchy, and we estimate an attack time for DES and A5/1 ciphers of less than one second, demonstrating that these ciphers can be cracked in real-time with a budget under 6000€. We finally discuss possible refinements to the model and to the hardware design that could be helpful in practice.
2023
4
File in questo prodotto:
File Dimensione Formato  
PreprintSN23.pdf

non disponibili

Tipologia: Documento in Pre-print
Licenza: Accesso chiuso-personale
Dimensione 492.66 kB
Formato Adobe PDF
492.66 kB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5021267
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact