Among methods of breaking a cipher, exhaustive key search stands out as the most successful (albeit the least efficient) method. We demonstrate that various algorithmic implementations of exhaustive key search are not equally effective, and cryptosystems can be devised which make some implementations of exhaustive key search unsuccessful (in the sense that the problem these algorithms try to solve turns out to be incomputable). We observe that there are implementations of exhaustive key search that are always successful (i.e. they terminate and generate a correct result irrespective of the cryptosystem they are used against). As to those implementations of exhaustive key search that are not always successful, we describe them and those cryptosystems that can make them unsuccessful.
[1]
Yonatan Aumann,et al.
Information Theoretically Secure Communication in the Limited Storage Space Model
,
1999,
CRYPTO.
[2]
Stefan Wolf,et al.
Unconditional Security in Cryptography
,
1998,
Lectures on Data Security.
[3]
Michael O. Rabin,et al.
Hyper-Encryption and Everlasting Security
,
2002,
STACS.
[4]
Yonatan Aumann,et al.
Everlasting security in the bounded storage model
,
2002,
IEEE Trans. Inf. Theory.
[5]
C. Q. Lee,et al.
The Computer Journal
,
1958,
Nature.
[6]
Bruce Schneier,et al.
Practical cryptography
,
2003
.
[7]
Ueli Maurer.
Conditionally-perfect secrecy and a provably-secure randomized cipher
,
2004,
Journal of Cryptology.