2019
DOI: 10.36244/icj.2019.4.1
|View full text |Cite
|
Sign up to set email alerts
|

SAT Attacks on ARX Ciphers with Automated Equations Generation

Abstract: We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers -SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the exe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In our experiments we use a 4-round SPN with n B = 16, m = 4 with variable S-boxes, and a fixed permutation layer given by bit permutation (1,5,9,13,2,6,10,14,3,7,11,15,4,8,12,16). As a key schedule, we use either repetition of a 16-bit key (for n K = 16), 5 independent 16-bit subkeys (for n K = 80), or a sequence of low 16-bits from a shifted 32-bit key (for n K = 32).…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…In our experiments we use a 4-round SPN with n B = 16, m = 4 with variable S-boxes, and a fixed permutation layer given by bit permutation (1,5,9,13,2,6,10,14,3,7,11,15,4,8,12,16). As a key schedule, we use either repetition of a 16-bit key (for n K = 16), 5 independent 16-bit subkeys (for n K = 80), or a sequence of low 16-bits from a shifted 32-bit key (for n K = 32).…”
Section: Preliminariesmentioning
confidence: 99%
“…In a recent article [2], Andrzejczak and Dudzic attack smaller versions of block ciphers SIMON and SPECK. Instead of modeling the whole cipher, they do not model the key expansion algorithm, and instead, try to find independent subkeys.…”
Section: Introductionmentioning
confidence: 99%
“…Boolean and SAT encoding, among other mathematical methods of software systems specification and verification [3,4], can be used to solve problems in many fields [5][6][7][8][9][10]. This approach usually consists in transforming the studied problems into the SAT problem, solving it, and then mapping the obtained model to the solution of the source problem.…”
Section: Introductionmentioning
confidence: 99%