Abstract

We provide rigorous time/space trade-offs for inverting any function. Given a function f, we give a time/space trade-off of T S2 = N3q (f), where q(f) is the probability that two random elements (taken with replacement) are mapped to the same image under f. We also give a more general trade-off, T S3 = N3, that can invert any function at any point.

MSC codes

  1. 68M10
  2. 68Q20
  3. 68Q22
  4. 68R05
  5. 68R10

Keywords

  1. cryptography
  2. cryptanalysis
  3. one-way functions
  4. randomized algorithms
  5. random graphs
  6. hashing data encryption standard

Get full access to this article

View all available purchase options and get full access to this article.

References

1.
A. Aho, Dž. Hopkroft, Dž. Ul’man, Postroenie i analiz vychislitelnykh algoritmov, “Mir”, 1979, 536–0, Translated by A. O. Slisenko; Edited by Ju. V. Matijasevič
2.
A. Aho and D. Lee, Storing a dynamic sparse table, in Proceedings 27th IEEE Symposium on Foundations of Computer Science, Chicago, 1986, pp. 55–60.
3.
Noga Alon, László Babai, Alon Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem, J. Algorithms, 7 (1986), 567–583
4.
Michael Molloy, The probabilistic method, Algorithms Combin., Vol. 16, Springer, Berlin, 1998, 1–35
5.
Hamid Amirazizi, Martin Hellman, Time‐memory‐processor trade‐offs, IEEE Trans. Inform. Theory, 34 (1988), 505–512
6.
J. L. Carter and M. N. Wegman, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143–154.
7.
Benny Chor, Oded Goldreich, On the power of two‐point based sampling, J. Complexity, 5 (1989), 96–106
8.
B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky, The bit extraction problem or t‐resilient functions, in Proceedings 26th IEEE Symposium on Foundations of Computer Science, Portland, OR, 1985, pp. 396–407.
9.
Martin Dietzfelbinger, Anna Karlin, Kurt Mehlhorn, Friedhelm Meyer auf der Heide, Hans Rohnert, Robert Tarjan, Dynamic perfect hashing: upper and lower bounds, SIAM J. Comput., 23 (1994), 738–761
10.
A. Fiat, S. Moses, A. Shamir, I. Shimshoni, and G. Tardos, Planning and learning in permutation groups, in Proceedings 30th IEEE Symposium on Foundations of Computer Science, Research Triangle Park, NC, 1989, pp. 274–279.
11.
Michael Fredman, János Komlós, Endre Szemerédi, Storing a sparse table with O(1) worst case access time, J. Assoc. Comput. Mach., 31 (1984), 538–544
12.
Martin Hellman, A cryptanalytic time‐memory trade‐off, IEEE Trans. Inform. Theory, 26 (1980), 401–406
13.
M. E. Hellman and J. M. Reyneri, Drainage and the DES, summary, in Advances in Cryptology–Proceedings of Crypto ’82, Plenum Press, New York, 1982, pp. 129–131.
14.
Michael Luby, A simple parallel algorithm for the maximal independent set problem, SIAM J. Comput., 15 (1986), 1036–1053
15.
R. C. Merkle and M. E. Hellman, Hiding information and signatures in trapdoor functions, IEEE Trans. Inform. Theory, 24 (1978), pp. 525–530.
16.
Stephen Pohlig, Martin Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Information Theory, IT‐24 (1978), 106–110
17.
R. SchroepPel and A. Shamir, A T=O(2n/2), S=O(2n/4) algorithm for certain NP‐complete problems, SIAM J. Comput., 10 (1981), pp. 456–464.
18.
A. Shamir and J. Spencer, manuscript.
19.
A. Siegel, On universal classes of fast high performance hash functions, their time‐space tradeoff and their applications, in Proceedings 30th IEEE Symposium on Foundations of Computer Science, Research Triangle Park, NC, 1989, pp. 20–25.
20.
A. C. Yao, Coherent functions and program checkers, in Proc. 22nd ACM Symposium on Theory of Computing, New York, 1990, pp. 84–94.

Information & Authors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing
Pages: 790 - 803
ISSN (online): 1095-7111

History

Published online: 27 July 2006

MSC codes

  1. 68M10
  2. 68Q20
  3. 68Q22
  4. 68R05
  5. 68R10

Keywords

  1. cryptography
  2. cryptanalysis
  3. one-way functions
  4. randomized algorithms
  5. random graphs
  6. hashing data encryption standard

Authors

Affiliations

Metrics & Citations

Metrics

Citations

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited By

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share on social media