scispace - formally typeset
Proceedings ArticleDOI

Encoding Hash Functions as a SAT Problem

TLDR
This paper deals with an original application of the SAT problem to encode the well-known MD?
Abstract
The SATisfiability Problem is a core problem in mathematical logic and computing theory. In the last years, progresses have led it to be a great and competitive approach to practically solve a wide range of industrial and academic problems. Thus, the current SAT solving capacity allows the propositional formalism to be an interesting alternative to tackle cryptographic problems, and particularly introduced a new field called logical cryptanalysis [15]. This paper deals with an original application of the SAT problem to encode the well-known MD? and SHA? hash functions algorithm in a generic DIMACS formula. As cryptographic hash functions are central elements in modern cryptography we choose to validate our modelisation with a dedicated attack on the inversion of these functions. This attack behaves like a reverse-engineering process, thanks to a state of the art SAT solver achieving a weakening of the second preimage of MD? and SHA?. As a result, we present our modelisation and an improvement of the current limit of best practical attacks on step-reduced MD4, MD5 and SHA? inversions, respectively up to 39, 28 and 23 broken steps. Finally, a brief analyse of our results allows to give an idea about logical cryptanalysis and hash functions.

read more

Citations
More filters
Book ChapterDOI

Constraint Programming Models for Chosen Key Differential Cryptanalysis

TL;DR: This paper introduces Constraint Programming (CP) models to solve a cryptanalytic problem: the chosen key differential attack against the standard block cipher AES, and shows that Model 2 is much more efficient than Model 1, and that Chuffed is faster than Choco which is slower than Gecode on the hardest instances of this problem.
Book ChapterDOI

Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions

TL;DR: MapleCrypt as discussed by the authors is a SAT solver-based cryptanalysis tool for inverting hash functions, which reduces the hash function inversion problem for fixed targets into the satisfiability problem for Boolean logic, and uses MapleCrypt to construct preimages for these targets.
Posted Content

Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions

TL;DR: The hash function inversion problem for fixed targets is reduced into the satisfiability problem for Boolean logic, and MapleCrypt is presented which is a SAT solver-based cryptanalysis tool for inverting hash functions.
Proceedings ArticleDOI

A Study of the Private Set Intersection Protocol Based on Negative Databases

TL;DR: A two-party private set intersection protocol based on NDBs is proposed, and its security and efficiency are analyzed.

Solving a Symmetric Key Cryptographic Problem with Constraint Programming

TL;DR: This paper focuses on a particular problem coming from the symmetric key cryptography world, and introduces a CP model for this problem, and shows that Choco is able to solve it to optimality in less than two hours.
References
More filters
Book

A machine program for theorem-proving

TL;DR: The programming of a proof procedure is discussed in connection with trial runs and possible improvements.
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
Book ChapterDOI

A design principle for hash functions

Ivan Damgård
TL;DR: Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.
Book ChapterDOI

One way hash functions and DES

TL;DR: This work shows three one-way hash functions which are secure if DES is a good random block cipher.
Proceedings Article

Pushing the envelope: planning, propositional logic, and stochastic search

TL;DR: Stochastic methods are shown to be very effective on a wide range of scheduling problems, but this is the first demonstration of its power on truly challenging classical planning instances.