Propositional encoding of direct and inverse round transformations in attacks on some block ciphers | Applied Discrete Mathematics. Supplement. 2018. № 11. DOI: 10.17223/2226308X/11/24

Propositional encoding of direct and inverse round transformations in attacks on some block ciphers

We suggest an attack on block ciphers, which is based on the well-known meet-in-the-middle strategy. To solve the corresponding cryptanalysis equations, algorithms for solving the Boolean satisfiability problem (SAT) are used. The main know-how consists in the usage in the propositional encoding of the considered cipher not only information about direct round transformations, but also information about inverse round transformations. Using the suggested type of encodings, we have constructed runtime estimations of guess-and-determine attacks on several block ciphers with reduced number of rounds (6-round DES, 6-round PRESENT, 6-round and 8-round GOST 2814789). It turned out that in some cases these attacks are several times more effective than attacks, in which standard methods of propositional encodings are used.

Download file
Counter downloads: 153

Keywords

Boolean satisfiability problem, DES, PRESENT, block cipher, GOST 28147-89, криптоанализ, задача булевой выполнимости, PRESENT, DES, ГОСТ 28147-89, блочный шифр

Authors

NameOrganizationE-mail
Otpuschennikov I. V.Institute of Dynamics of Systems and Control Theory V.M. Matrosov SB RASotilya@yandex.ru
Semenov A. A.Institute of Dynamics of Systems and Control Theory V.M. Matrosov SB RASbiclop.rambler@yandex.ru
Zaikin O. S.Institute of Dynamics of Systems and Control Theory V.M. Matrosov SB RASzaikin.icc@gmail.com
Всего: 3

References

Kochemazov S. and Zaikin O. ALIAS: A modular tool for finding backdoors for SAT // Proc. SAT Conf. 2018. (to be published)
Yeo S., Li Z., Khoo K., and Low Y. An enhanced binary characteristic set algorithm and its applications to algebraic cryptanalysis // LNCS. 2017. V. 10355. P. 518-536.
Заикин О. С., Семенов А. А. Применение метода Монте-Карло к прогнозированию параллельного времени решения проблемы булевой выполнимости // Вычислительные методы и программирование. 2014. Т. 15. С. 22-35.
Massacci F. and Marraro L. Logical cryptanalysis as a SAT problem // J. Automated Reasoning. 2000. V. 24(1/2). P. 165-203.
Bard G. V. Algebraic Cryptanalysis. Springer, 2009.
Courtois N. T., Gawinecki J. A, and Song G. Contradiction immunity and guess-then-determine attacks on GOST // Tatra Mountains Math. Publ. 2012. V.53(1). P. 2-13.
Semenov A., Zaikin O., Otpuschennikov I., et al. On cryptographic attacks using backdoors for SAT // Proc. AAAI Conf. 2018. P. 6641-6648.
Semenov A. and Zaikin O. Algorithm for finding partitionings of hard variants of Boolean satisfiability problem with application to inversion of some cryptographic functions // SpringerPlus. 2016. V.5(1). P. 1-16.
Otpuschennikov I., Semenov A., Gribanova I., et al. Encoding cryptographic functions to SAT using Transalg system // Frontiers in Artificial Intelligence and Applications. 2016. V. 285. P. 1594-1595.
Отпущенников И.В., Семенов А. А. Технология трансляции комбинаторных проблем в булевы уравнения // Прикладная дискретная математика. 2011. №1. С. 96-115.
Biere A., Heule M., van Maaren H., and Walsh T. (eds.) Handbook of Satisfiability, Frontiers in Artificial Intelligence and Applications. V. 185. IOS Press, 2009.
 Propositional encoding of direct and inverse round transformations in attacks on some block ciphers | Applied Discrete Mathematics. Supplement. 2018. № 11. DOI: 10.17223/2226308X/11/24

Propositional encoding of direct and inverse round transformations in attacks on some block ciphers | Applied Discrete Mathematics. Supplement. 2018. № 11. DOI: 10.17223/2226308X/11/24