On Cryptographic Attacks Using Backdoors for SAT

被引:0
|
作者
Semenov, Alexander [1 ]
Zaikin, Oleg [1 ]
Otpuschennikov, Ilya [1 ]
Kochemazov, Stepan [1 ]
Ignatiev, Alexey [1 ,2 ]
机构
[1] RAS, Matrosov Inst Syst Dynam & Control Theory SB, Irkutsk, Russia
[2] Univ Lisbon, Fac Ciencias, LASIGE, Lisbon, Portugal
基金
俄罗斯科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis. Moreover, a number of practical applications of SAT can only be tackled efficiently by identifying and exploiting a subset of formula's variables called backdoor set (or simply backdoors). This paper proposes a new class of backdoor sets for SAT used in the context of cryptographic attacks, namely guess-and-determine attacks. The idea is to identify the best set of backdoor variables subject to a statistically estimated hardness of the guess-and-determine attack using a SAT solver. Experimental results on weakened variants of the renowned encryption algorithms exhibit advantage of the proposed approach compared to the state of the art in terms of the estimated hardness of the resulting guess-and-determine attacks.
引用
收藏
页码:6641 / 6648
页数:8
相关论文
共 50 条
  • [31] An approach to finding the attacks on the cryptographic protocols
    Sun, Yongxing
    Wang, Xinmei
    Operating Systems Review (ACM), 2000, 34 (03): : 19 - 28
  • [32] Distributed computing attacks on cryptographic systems
    Selkirk, APL
    Escott, AE
    BT TECHNOLOGY JOURNAL, 1999, 17 (02) : 69 - 73
  • [33] Reconstruction of attacks against cryptographic protocols
    Allamigeon, X
    Blanchet, B
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154
  • [34] Synthesis of Fault Attacks on Cryptographic Implementations
    Barthe, Gilles
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Zapalowicz, Jean-Christophe
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1016 - 1027
  • [35] Hiding Backdoors within Event Sequence Data via Poisoning Attacks
    A. Ermilova
    E. Kovtun
    D. Berestnev
    A. Zaytsev
    Doklady Mathematics, 2024, 110 (Suppl 1) : S288 - S298
  • [36] Side-channel cryptographic attacks using pseudo-boolean optimization
    Yossef Oren
    Avishai Wool
    Constraints, 2016, 21 : 616 - 645
  • [37] Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols
    Mayouf, Mabroka Ali
    Shukur, Zarina
    VISUAL INFORMATICS: BRIDGING RESEARCH AND PRACTICE, 2009, 5857 : 510 - 520
  • [38] Hardening Encrypted Patient Names Against Cryptographic Attacks Using Cellular Automata
    Schnell, Rainer
    Borgs, Christian
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 518 - 522
  • [39] Kernel-based template attacks of cryptographic circuits using static power
    Xu, Jiming
    Heys, Howard M.
    INTEGRATION-THE VLSI JOURNAL, 2019, 66 (67-79) : 67 - 79
  • [40] Side-channel cryptographic attacks using pseudo-boolean optimization
    Oren, Yossef
    Wool, Avishai
    CONSTRAINTS, 2016, 21 (04) : 616 - 645