CDCL(Crypto) SAT Solvers for Cryptanalysis

05/27/2020
by   Saeed Nejati, et al.
0

Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-driven clause-learning Boolean satisfiability (CDCL SAT) solvers on industrial problems from a variety of domains. The availability of such powerful general-purpose search tools as SAT solvers has led many researchers to propose SAT-based methods for cryptanalysis, including techniques for finding collisions in hash functions and breaking symmetric encryption schemes. Most of the previously proposed SAT-based cryptanalysis approaches are blackbox techniques, in the sense that the cryptanalysis problem is encoded as a SAT instance and then a CDCL SAT solver is invoked to solve the said instance. A weakness of this approach is that the encoding thus generated may be too large for any modern solver to solve efficiently. Perhaps a more important weakness of this approach is that the solver is in no way specialized or tuned to solve the given instance. To address these issues, we propose an approach called CDCL(Crypto) (inspired by the CDCL(T) paradigm in Satisfiability Modulo Theory solvers) to tailor the internal subroutines of the CDCL SAT solver with domain-specific knowledge about cryptographic primitives. Specifically, we extend the propagation and conflict analysis subroutines of CDCL solvers with specialized codes that have knowledge about the cryptographic primitive being analyzed by the solver. We demonstrate the power of this approach in the differential path and algebraic fault analysis of hash functions. Our initial results are very encouraging and reinforce the notion that this approach is a significant improvement over blackbox SAT-based cryptanalysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/02/2019

FourierSAT: A Fourier Expansion-Based Algebraic Framework for Solving Hybrid Boolean Constraints

The Boolean SATisfiability problem (SAT) is of central importance in com...
research
07/29/2009

Restart Strategy Selection using Machine Learning Techniques

Restart strategies are an important factor in the performance of conflic...
research
07/27/2021

On Improving the Backjump Level in PB Solvers

Current PB solvers implement many techniques inspired by the CDCL archit...
research
01/30/2020

Parity (XOR) Reasoning for the Index Calculus Attack

Models for cryptographic problems are often expressed as boolean polynom...
research
03/04/2020

Towards a Complexity-theoretic Understanding of Restarts in SAT solvers

Restarts are a widely-used class of techniques integral to the efficienc...
research
03/04/2023

Conflict-driven Structural Learning Towards Higher Coverage Rate in ATPG

Due to the increasing challenges posed by the relentless rise in the des...
research
07/02/2023

SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits

Fault injection attacks represent a type of active, physical attack agai...

Please sign up or login with your details

Forgot password? Click here to reset