首页 > 其他分享 >密码学SAT入门文献1——Algebraic and Logic Solving Methods for Cryptanalysis

密码学SAT入门文献1——Algebraic and Logic Solving Methods for Cryptanalysis

时间:2023-03-20 10:22:19浏览次数:37  
标签:Solving based Methods 求解 solving solvers 密码学 logic SAT

密码学SAT入门文献2——CDCL(Crypto) SAT Solvers for Cryptanalysis

 


  Abstract
 

Algebraic solving of polynomial systems and satisfiability of propositional logic formulas are not two completely separate research areas, as it may appear at first sight. In fact, many problems coming from cryptanalysis, such as algebraic fault attacks, can be rephrased as solving a set of Boolean polynomials or as deciding the satisfiability of a propositional logic formula.

译文:事实上,许多来自密码分析的问题,如代数错误攻击,可以重新表述为解决一组布尔多项式或确定命题逻辑公式的可满足性

Thus one can analyze the security of cryptosystems by applying standard solving methods from computer algebra and SAT solving.

译文:因此,人们可以通过应用计算机代数和SAT求解的标准求解方法来分析密码系统的安全性。

This doctoral thesis is dedicated to studying solvers that are based on logic and algebra separately as well as integrating them into one such that the combined solvers become more powerful tools for cryptanalysis.

译文:这篇博士论文致力于研究分别基于逻辑和代数的求解器,以及将它们集成到一起,使组合求解器成为密码分析的更强大的工具

This disseration is divided into three parts. In this first part, we recall some theory and basic techniques for algebraic and logic solving. We focus mainly on DPLL-based SAT solving and techniques that are related to border bases and Gröbner bases.

译文:本文共分为三个部分。在第一部分中,我们回顾了代数和逻辑求解的一些理论和基本技术。我们主要关注基于dpll的SAT求解和与边界基地和Gröbner基地相关的技术。

 

In particular, we describe in detail the Border Basis Algorithm and discuss its specialized version for Boolean polynomials called the Boolean Border Basis Algorithm. In the second part of the thesis, we deal with connecting solvers based on algebra and logic. 特别地,我们详细描述了边界基算法,并讨论了布尔多项式的专门版本,称为布尔边界基算法。在论文的第二部分,我们处理基于代数和逻辑的连接求解器。

The ultimate goal is to combine the strength of different solvers into one. Namely, we fuse the XOR reasoning from algebraic solvers with the light, efficient design of SAT solvers. As a first step in this direction, we design various conversions from sets of clauses to sets of Boolean polynomials, and vice versa, such that solutions and models are preserved via the conversions.最终目标是将不同解算器的力量合而为一。也就是说,我们将代数解算器中的异或推理与SAT解算器的轻、高效设计融合在一起。作为这个方向的第一步,我们设计了从子句集到布尔多项式集的各种转换,反之亦然,这样通过转换可以保留解和模型。

In particular, based on a block-building mechanism, we design a new blockwise algorithm for the CNF to ANF conversion which is geared towards producing fewer and lower degree polynomials. 特别地,基于块构建机制,我们设计了一种新的基于块的CNF到ANF转换算法,该算法旨在产生更少、更低阶的多项式。

The above conversions allow usto integrate both solvers via a communication interface. To reach an even tighter integration, we consider proof systems that combine resolution and polynomial calculus, i.e. the two most used proof systems in logic and algebraic solving.

译文:上述转换允许我们通过通信接口集成两个求解器。为了达到更紧密的集成,我们考虑了结合分辨率和多项式演算的证明系统,即逻辑和代数求解中最常用的两个证明系统

Based on such a proof system, which we call SRES, we introduce new types of solving algorithms that demostrate the synergy between Gröbner-like and DPLL-like solving. At the end of the second part of the dissertation, we provide some experiments based on a new benchmark which illustrate that the our new method based on DPLL has the potential to outperform CDCL SAT solvers.

译文:基于这样一个我们称为SRES的证明系统,我们引入了新的求解算法类型,演示了Gröbner-like和类dpll求解之间的协同作用。在论文第二部分的最后,我们提供了一些基于新的基准的实验,这些实验表明,我们的基于DPLL的新方法具有超越CDCL SAT求解器的潜力。

In the third part of the thesis, we focus on practical attacks on various cryptograhic primitives. For instance, we apply SAT solvers in the case of algebraic fault attacks on the symmetric ciphers LED and derivatives of the block cipher AES. 在论文的第三部分,我们重点讨论了对各种密码原语的实际攻击。例如,我们将SAT求解器应用于对称密码LED和分组密码AES的导数上的代数故障攻击

The main goal there is to derive so-called fault equations automatically from the hardware description of the cryptosystem and thus automatizate the attack. 主要目标是从密码系统的硬件描述中自动推导出所谓的故障方程,从而实现攻击的自动化。

To give some extra power to a SAT solver that inverts the hash functions SHA-1 and SHA-2, we describe how to tweak the SAT solver using a programmatic interface such that the propagation of the solver and thus the attack itself is improved. 为了给反转散列函数SHA-1和SHA-2的SAT求解器提供一些额外的功能,我们描述了如何使用编程接口来调整SAT求解器,以便改进求解器的传播,从而改进攻击本身。

   

标签:Solving,based,Methods,求解,solving,solvers,密码学,logic,SAT
From: https://www.cnblogs.com/yuweng1689/p/17235381.html

相关文章

  • Beyond Independent Relevance: Methods and Evaluation Metrics for Subtopic Retrie
    目录概符号说明S-recallandS-precisionZhaiC.,CohenW.W.andLaffertyJ.Beyondindependentrelevance:methodsandevaluationmetricsforsubtopicretrieva......
  • 密码学——DES加密
    DES加密算法首先,我们讲一下分组密码,顾名思义就是将明文消息分成组来进行加密,也就是说,加密器每次只能处理特定长度的一组数据,这里的"一组数据"就被称之为分组。我们也将每......
  • 「密码学」哈希为什么要将盐加在明文后面?
    众所周知,在做消息认证或者签名时,仅使用hash函数安全性是不高的,容易遭受字典和暴力破解(https://www.cmd5.com/)。所以通常会使用带密钥或加盐的哈希算法作为消息认证或者口......
  • 密码学报如何正确Latex投稿?
    记录一下《密码学报》投稿遇到的坑,要不研究一下,投稿都不会投!(死在第一步)模版地址http://www.jcr.cacrnet.org.cn/CN/column/column13.shtml下载的是一个ZIP压缩包,是......
  • 密码学基础概念
    把一段原始数据通过某种算法处理成另外一种数据(原始数据为明文,处理后的数据为密文)。明文->密文:称之为加密。密文->明文:称之为解密。图1在加密过程中我们需要知道下面的......
  • 密码学简单数论(3):算术基本定理证明、等价关系、同余和乘法逆元
    参考资料:1.https://www.bilibili.com/video/BV1x3411s7Sy/?spm_id_from=333.788&vd_source=e66dd25b0246f28e772d75f11c80f03c算术基本定理证明  定理2-2(算术基本定......
  • 密码学基础概念
    裴蜀定理说明了对任何整数a、b和它们的最大公约数d,关于未知数x和y的线性不定方程(称为裴蜀等式):\(若a,b是整数,且gcd(a,b)=d,那么对于任意的整数x,y,ax+by都一定是d的倍数,特别......
  • Golang基础-Structs与Methods
    将struct定义为一种类型CarNewCar函数return&Car{},返回指针//car.gopackageelon//Carimplementsaremotecontrolledcar.typeCarstruct{ speed......
  • 密码学与网安——intro
    Terminologyprimitive:原语(一种不可分割的最基础操作,跟具体的视角和情形有关)两个时间节点1949年(1945年):Shannon提出完全安全性,开始现代密码学1976年:Diffie-Hel......
  • 密码学简单数论笔记(2):最大公约数、扩展欧几里得算法和最小公倍数
      参考资料:1.https://www.bilibili.com/video/BV1x3411s7Sy/?spm_id_from=333.788&vd_source=e66dd25b0246f28e772d75f11c80f03c2.http://t.csdn.cn/diQ272.余红兵:《......