CryptoMiniSat Switches-Optimization for Solving Cryptographic Instances

12/21/2021
by   A. -M. Leventi-Peetz, et al.
0

Performing hundreds of test runs and a source-code analysis, we empirically identified improved parameter configurations for the CryptoMiniSat (CMS) 5 for solving cryptographic CNF instances originating from algebraic known-plaintext attacks on 3 rounds encryption of the Small AES-64 model cipher SR(3, 4, 4, 4). We finally became able to reconstruct 64-bit long keys in under an hour real time which, to our knowledge, has never been achieved so far. Especially, not without any assumptions or previous knowledge of key-bits (for instance in the form of side-channels, as in <cit.>). A statistical analysis of the non-deterministic solver runtimes was carried out and command line parameter combinations were defined to yield best runtimes which ranged from under an hour to a few hours in median at the beginning. We proceeded using an Automatic Algorithm Configuration (AAC) tool to systematically extend the search for even better solver configurations with success to deliver even shorter solving times. In this work we elaborate on the systematics we followed to reach our results in a traceable and reproducible way. The ultimate focus of our investigations is to find out if CMS, when appropriately tuned, is indeed capable to attack even bigger and harder problems than the here solved ones. For the domain of cryptographic research, the duration of the solving time plays an inferior role as compared to the practical feasibility of finding a solution to the problem. The perspective scalability of the here presented results is the object of further investigations.

READ FULL TEXT

page 8

page 9

research
06/13/2023

Exploiting Configurations of MaxSAT Solvers

In this paper, we describe how we can effectively exploit alternative pa...
research
06/09/2021

Recovering AES Keys with a Deep Cold Boot Attack

Cold boot attacks inspect the corrupted random access memory soon after ...
research
07/02/2023

Automatic MILP Solver Configuration By Learning Problem Similarities

A large number of real-world optimization problems can be formulated as ...
research
01/30/2020

Parity (XOR) Reasoning for the Index Calculus Attack

Models for cryptographic problems are often expressed as boolean polynom...
research
02/14/2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis

Rank Decoding (RD) is the main underlying problem in rank-based cryptogr...
research
01/04/2022

An algebraic attack to the Bluetooth stream cipher E0

In this paper we study the security of the Bluetooth stream cipher E0 fr...

Please sign up or login with your details

Forgot password? Click here to reset