2018
DOI: 10.1049/iet-ifs.2017.0176
|View full text |Cite
|
Sign up to set email alerts
|

CryptoSAT: a tool for SAT‐based cryptanalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Encoding table constraints with SAT. In [Laf18], Lafitte describes how to encode a relation R ⊆ {0, 1} n (such that R is composed of k words of {0, 1} n ) as a SAT formula with 2 n − k clauses: Each of these clauses is a disjunction of n litterals which forbids one word of {0, 1} n \ R. This encoding may be used to model the S-box differential relation and, in this case, we have 33150 clauses for each byte that passes through an active S-box. In [SWW18], Sun et al show how to reduce the number of clauses by using the same approach as in [AST + 17].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Encoding table constraints with SAT. In [Laf18], Lafitte describes how to encode a relation R ⊆ {0, 1} n (such that R is composed of k words of {0, 1} n ) as a SAT formula with 2 n − k clauses: Each of these clauses is a disjunction of n litterals which forbids one word of {0, 1} n \ R. This encoding may be used to model the S-box differential relation and, in this case, we have 33150 clauses for each byte that passes through an active S-box. In [SWW18], Sun et al show how to reduce the number of clauses by using the same approach as in [AST + 17].…”
Section: Methodsmentioning
confidence: 99%
“…In [Wal00], Walsh shows that enforcing arc consistency on a binary constraint filters more values than unit propagation on the kind of SAT encoding proposed in [Laf18,SWW18]. This explains why SAT solvers on this encoding are usually outperformed by CP solvers.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As soon as R1 or R2 can be chosen,weak states can be reached for reduced round versions, although the numberof satisfiable instances decreases as a function of the number of rounds. Theseweak state have no concern to the security feature of ZUC [6] [7].…”
Section: Guess-and-determine Attack[5]mentioning
confidence: 99%
“…Similarly to ILP, non linear operations such as SubBytes are not straight-forward to model by means of clauses. In [18], Lafitte shows how to encode a relation associated with a non linear operation into a set of clauses and, in [24], Sun et al show how to reduce the number of clauses by using the same approach as in [1]. However, the resulting SAT model does not scale well and cannot solve Step2 for AES, for example.…”
mentioning
confidence: 99%