首页 > 其他分享 >密码学SAT入门文献0——Using Walk-SAT and Rel-SAT for cryptographic key search

密码学SAT入门文献0——Using Walk-SAT and Rel-SAT for cryptographic key search

时间:2023-03-20 15:35:43浏览次数:40  
标签:cryptographic Rel DES Walk key Using 密码学 SAT

 Fabio Massacci. 1999. Using Walk-SAT and Rel-SAT for cryptographic key search.
In IJCAI, Vol. 1999. 290–295.


 

 

本人的组织架构:

第2节 介绍一些关于密码学和数据加密标准的基本知识; 

第3节 讨论了编码的特点;

第4节 用Walk-SAT和Rel-SAT进行实验分析;

第5节 可以从皮尤研究中心学到SAT求解者的经验 ;

第6节 新的挑战;

第7节 对论文进行总结。

   
   
   
   
 

1 Introduction

   
   
   
   
 

2 Cryptography and DES

 

[Schneier, 1994] B. Schneier.Applied Cryptography:Protocols,Algorithms, and Source Code in C. John Wiley & Sons, 1994.

位向量P(明文) C(密文) K(秘钥)。

Search can be cut down if the cryptanalyst knows a sufficient number of blocks of plaintext with the corresponding ciphertext (known plaintext attack). This is a reasonable hypothesis: almost all messages and files have fixed parts. Using a network of 12 workstation and 247 (randomly generated) plaintexts, Matsui [1994a] broke DES in 50 days.

译文:如果密码分析人员知道足够多的带有相应密文的明文块(已知明文攻击),则可以减少搜索。

译文:这是一个合理的假设:几乎所有的消息和文件都有固定的部分。使用12个工作站和247个(随机生成的)明文网络,Matsui [1994a]在50天内打破了DES。

 

 As the reader might now want to know how DES works, we start by saying that DES is a block cipher, which encipher blocks (sequences) of 64 bits into blocks of 64 bits using a key of 56 bits'. DES and almost all symmetric ciphers are built following an architecture which is due to Feistel and his group [Feistel et al., 1975]. After some initial preprocessing, the following operations are executed:

1. break the plaintext in two halves,

2. combine one half with the key using a clever function,

3. XOR the combination with the other half

4. swap the two parts.

These 4 operations constitutes a round and are repeated a suitable number of times. Figure 1 exemplifies the idea.

 

 

   
   
   
   
   

 

标签:cryptographic,Rel,DES,Walk,key,Using,密码学,SAT
From: https://www.cnblogs.com/yuweng1689/p/17236463.html

相关文章