Parity (XOR) Reasoning for the Index Calculus Attack

01/30/2020
by   Monika Trimoska, et al.
0

Models for cryptographic problems are often expressed as boolean polynomial systems, whose equivalent logical formulas can be treated using SAT solvers. Given the algebraic nature of the problem, the use of the logical XOR operator is common in SAT-based cryptanalysis. Recent works have focused on advanced techniques for handling parity (XOR) constraints, such as the Gaussian Elimination technique. First, we propose an original XOR-reasoning SAT solver, named WDSat, dedicated to a specific cryptographic problem. Secondly, we show that in some cases Gaussian Elimination on SAT instances does not work as well as Gaussian Elimination on algebraic systems. We demonstrate how this oversight is fixed in our solver, which is adapted to read instances in algebraic normal form (ANF). Finally, we propose a novel preprocessing technique based on the Minimal Vertex Cover Problem in graph theory. Our benchmarks use a model obtained from cryptographic instances for which a significant speedup is achieved using the findings in this paper. We further explain how our preprocessing technique can be used as an assessment of the security of a cryptographic system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/09/2023

Proof Generation for CDCL Solvers Using Gauss-Jordan Elimination

Traditional Boolean satisfiability (SAT) solvers based on the conflict-d...
research
05/27/2020

CDCL(Crypto) SAT Solvers for Cryptanalysis

Over the last two decades, we have seen a dramatic improvement in the ef...
research
07/04/2016

Encoding Cryptographic Functions to SAT Using Transalg System

In this paper we propose the technology for constructing propositional e...
research
08/31/2011

Coprocessor - a Standalone SAT Preprocessor

In this work a stand-alone preprocessor for SAT is presented that is abl...
research
05/27/2021

Propositional Encodings of Acyclicity and Reachability by using Vertex Elimination

We introduce novel methods for encoding acyclicity and s-t-reachability ...
research
12/21/2021

CryptoMiniSat Switches-Optimization for Solving Cryptographic Instances

Performing hundreds of test runs and a source-code analysis, we empirica...
research
12/05/2022

Inverting Cryptographic Hash Functions via Cube-and-Conquer

MD4 and MD5 are seminal cryptographic hash functions proposed in early 1...

Please sign up or login with your details

Forgot password? Click here to reset