2014
DOI: 10.3233/sat190099
|View full text |Cite
|
Sign up to set email alerts
|

Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages

Abstract: This paper investigates the power of SAT solvers in cryptanalysis. The contributions are twofold and are relevant to both theory and practice. First, we introduce an efficient, generic and automated method for generating SAT instances encoding a wide range of cryptographic computations. This method can be used to automate the first step of algebraic attacks, i.e. the generation of a system of algebraic equations. Second, we illustrate the limits of SAT solvers when attacking cryptographic algorithms, with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…This idea supplements other classic methods of cryptanalysis [5,6,13,20,21]. In the literature can be still found new papers devoted to this topic [7,10,11,16,17,18,19,22,24].…”
Section: Introductionmentioning
confidence: 68%
“…This idea supplements other classic methods of cryptanalysis [5,6,13,20,21]. In the literature can be still found new papers devoted to this topic [7,10,11,16,17,18,19,22,24].…”
Section: Introductionmentioning
confidence: 68%
“…CryptoSAT has already been used in order to (i) find weak keys in idea variants [29], (ii) prove that similar weak keys do not exist in other variants [29], (iii) verify potential flaws of the stream cipher ZUC that are due to its implementation [23]. These results show that CRYPTOSAT is a valuable tool for cryptanalysts, designers, and implementors, respectively.…”
Section: Discussionmentioning
confidence: 86%
“…In algebraic cryptanalysis, one attack method is to model a cipher along with its inputs and outputs as a SAT problem. This can be used to find, for example, weak keys in block ciphers or preimages in hash functions (Lafitte et al, 2014). SAT problems are typically expressed in conjunctive normal form (CNF) and logic circuits can quickly be converted into CNF using the Tseytin transform (Knuth, 2015).…”
Section: Statement Of Needmentioning
confidence: 99%
“…Thus, an efficient logic gate representation of an S-box can be transformed into an efficient CNF representation. CNF representations can in turn be transformed into a system of equations in GF(2) (Lafitte et al, 2014).…”
Section: Statement Of Needmentioning
confidence: 99%