On Cryptographic Attacks Using Backdoors for SAT

被引:0
|
作者
Semenov, Alexander [1 ]
Zaikin, Oleg [1 ]
Otpuschennikov, Ilya [1 ]
Kochemazov, Stepan [1 ]
Ignatiev, Alexey [1 ,2 ]
机构
[1] RAS, Matrosov Inst Syst Dynam & Control Theory SB, Irkutsk, Russia
[2] Univ Lisbon, Fac Ciencias, LASIGE, Lisbon, Portugal
基金
俄罗斯科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis. Moreover, a number of practical applications of SAT can only be tackled efficiently by identifying and exploiting a subset of formula's variables called backdoor set (or simply backdoors). This paper proposes a new class of backdoor sets for SAT used in the context of cryptographic attacks, namely guess-and-determine attacks. The idea is to identify the best set of backdoor variables subject to a statistically estimated hardness of the guess-and-determine attack using a SAT solver. Experimental results on weakened variants of the renowned encryption algorithms exhibit advantage of the proposed approach compared to the state of the art in terms of the estimated hardness of the resulting guess-and-determine attacks.
引用
收藏
页码:6641 / 6648
页数:8
相关论文
共 50 条
  • [41] Electromagnetic Analysis and Attacks System for Cryptographic RFID
    Zhu, Zhihui
    Liu, Wei
    Li, Xiangyu
    Wu, Liji
    Zhang, Xiangming
    2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT-2012), 2012, : 544 - 546
  • [42] Efficient Padding Oracle Attacks on Cryptographic Hardware
    Bardou, Romain
    Focardi, Riccardo
    Kawamoto, Yusuke
    Simionato, Lorenzo
    Steel, Graham
    Tsay, Joe-Kai
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 608 - 625
  • [43] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [44] Quantum Communication Attacks on Classical Cryptographic Protocols
    Damgard, Ivan
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181
  • [45] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [46] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
    Berndt, Sebastian
    Wichelmann, Jan
    Pott, Claudius
    Traving, Tim-Henrik
    Eisenbarth, Thomas
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
  • [47] Neutralizing Interest Flooding Attacks in Named Data Networks using Cryptographic Route Tokens
    Alston, Aubrey
    Refaei, Tamer
    15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), 2016, : 85 - 88
  • [48] RansomWall: A Layered Defense System against Cryptographic Ransomware Attacks using Machine Learning
    Shaukat, Saiyed Kashif
    Ribeiro, Vinay J.
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 356 - 363
  • [49] Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits
    Alioto, Massimo
    Giancane, Luca
    Scotti, Giuseppe
    Trifiletti, Alessandro
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2010, 57 (02) : 355 - 367
  • [50] Continuous approximation of sat decision as applied to cryptographic analysis of asymmetric ciphers
    Dylkeyt, Vladimir Igorevitch
    Faizullin, Rashit Tagirovitch
    Khnykin, Ivan Gennadyevitch
    Computer Optics, 2009, 33 (01) : 86 - 90