On Cryptographic Attacks Using Backdoors for SAT

被引:0
|
作者
Semenov, Alexander [1 ]
Zaikin, Oleg [1 ]
Otpuschennikov, Ilya [1 ]
Kochemazov, Stepan [1 ]
Ignatiev, Alexey [1 ,2 ]
机构
[1] RAS, Matrosov Inst Syst Dynam & Control Theory SB, Irkutsk, Russia
[2] Univ Lisbon, Fac Ciencias, LASIGE, Lisbon, Portugal
基金
俄罗斯科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis. Moreover, a number of practical applications of SAT can only be tackled efficiently by identifying and exploiting a subset of formula's variables called backdoor set (or simply backdoors). This paper proposes a new class of backdoor sets for SAT used in the context of cryptographic attacks, namely guess-and-determine attacks. The idea is to identify the best set of backdoor variables subject to a statistically estimated hardness of the guess-and-determine attack using a SAT solver. Experimental results on weakened variants of the renowned encryption algorithms exhibit advantage of the proposed approach compared to the state of the art in terms of the estimated hardness of the resulting guess-and-determine attacks.
引用
收藏
页码:6641 / 6648
页数:8
相关论文
共 50 条
  • [21] Extending SAT Solvers to Cryptographic Problems
    Soos, Mate
    Nohl, Karsten
    Castelluccia, Claude
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2009, PROCEEDINGS, 2009, 5584 : 244 - 257
  • [22] Disguising Attacks with Explanation-Aware Backdoors
    Noppel, Maximilian
    Peter, Lukas
    Wressnegger, Christian
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 664 - 681
  • [23] Fault Attacks on Cryptographic Circuits
    Polian, Ilia
    2019 17TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2019,
  • [24] Inversion attacks on secure hash functions using SAT solvers
    De, Debapratim
    Kumarasubramanian, Abishek
    Venkatesan, Ramarathnam
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2007, PROCEEDINGS, 2007, 4501 : 377 - +
  • [25] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [26] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [27] Highly parallel cryptographic attacks
    Peinado, M
    Venkatesan, R
    RECENT ADVANCES IN PARALLEL VIRTUAL MACHINE AND MESSAGE PASSING INTERFACE, 1997, 1332 : 367 - 374
  • [28] A New Approach of the Cryptographic Attacks
    Cangea, Otilia
    Moise, Gabriela
    DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 521 - 534
  • [29] Boosting the Performance of CDCL-Based SAT Solvers by Exploiting Backbones and Backdoors
    Al-Yahya, Tasniem
    Menai, Mohamed El Bachir Abdelkrim
    Mathkour, Hassan
    ALGORITHMS, 2022, 15 (09)
  • [30] Evaluation of Power Analysis Attacks on Cryptographic Circuit Using Adiabatic Logic
    Koyasu, Hiroki
    Takahashi, Yasuhiro
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 410 - 414