Theory and Applications of Satisfiability Testing – SAT 2008
DOI: 10.1007/978-3-540-79719-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Bivium Using SAT Solvers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(54 citation statements)
references
References 10 publications
0
53
0
1
Order By: Relevance
“…SAT solvers have also been applied to the cryptanalysis of stream ciphers. Eibach et al [17] presented an experimental results over a slightly modified version of Trivium (Bivium) using a SAT solver, exhaustive search, a BDD based attack, a graph theoretic approach, and Grobner basis. Their results concluded that the initial state of the cipher is recovered and the using of SAT solver is faster than the other attacks.…”
Section: Sat Solvers and Its Applications To Cryptanalysismentioning
confidence: 99%
“…SAT solvers have also been applied to the cryptanalysis of stream ciphers. Eibach et al [17] presented an experimental results over a slightly modified version of Trivium (Bivium) using a SAT solver, exhaustive search, a BDD based attack, a graph theoretic approach, and Grobner basis. Their results concluded that the initial state of the cipher is recovered and the using of SAT solver is faster than the other attacks.…”
Section: Sat Solvers and Its Applications To Cryptanalysismentioning
confidence: 99%
“…By using the floating representation from (1.1)-(1.3) and (2), Algorithm 1 describes the procedure of generating a system of 4n polynomial equations (n linear and 3n quadratic). Solving this system requires to find the inner state of Trivium at time t ≥ t 0 and then by clocking Trivium backwards, we get the secret key k. The best known algebraic attack on a scaled version of Trivium (called Bivium) was developed by Eibach et al in [8] using SAT solvers and up to date there is no known algebraic attack better than the brute force on Trivium.…”
Section: Algebraic Representationmentioning
confidence: 99%
“…SAT solvers and Gröbner basis have also been applied to the cryptanalysis of stream ciphers. Eibach et al [18] presented experimental results on attacking a reduced version of Trivium (Bivium) using exhaustive search, a SAT solver, a binary decision diagram (BDD) based attack, a graph theoretic approach, and Gröbner basis. Their result implies that the usage of the SAT solver is faster than the other attacks.…”
Section: Modern Algebraic Tools and Their Applications To Cryptographymentioning
confidence: 99%