Complete SAT based Cryptanalysis of RC5 Cipher

IF 0.3 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Journal of Information and Organizational Sciences Pub Date : 2020-12-18 DOI:10.31341/jios.44.2.10
Artur Soboń, M. Kurkowski, Sylwia Stachowiak
{"title":"Complete SAT based Cryptanalysis of RC5 Cipher","authors":"Artur Soboń, M. Kurkowski, Sylwia Stachowiak","doi":"10.31341/jios.44.2.10","DOIUrl":null,"url":null,"abstract":"Keeping the proper security level of ciphers used in communication networks is today a very important problem. Cryptanalysts ensure a constant need for improvement complexity and ciphers' security by trying to break them. Sometimes they do not instantly try to break the strongest version of the cipher, but they are looking for weaknesses by splitting it and independently checking all algorithm components. Often cryptanalysts also attempt to break cipher by using its weaker version or configuration. There are plenty of mechanisms and approaches to cryptanalysis to solve those challenges. One of them is SAT-based method, that uses logical encoding. In this article, we present our wide analysis and new experimental results of SATbased, direct cryptanalysis of the RC5 cipher. To perform such actions on the given cipher, we initially create a propositional logical formula, that describes and represents the entire RC5 algorithm. The second step is to randomly generate key and plaintext. Then we determine the ciphertext. In the last step of our computations, we use SAT-solvers. They are particularly designed tools for checking the satisfiability of the Boolean formulas. In our research, we make cryptanalysis of RC5 cipher in the case with plaintext and ciphertext. To get the best result, we compared many SATsolvers and choose several. Some of them were relatively old, but still very efficient and some were modern and popular.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"365-382"},"PeriodicalIF":0.3000,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information and Organizational Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31341/jios.44.2.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 1

Abstract

Keeping the proper security level of ciphers used in communication networks is today a very important problem. Cryptanalysts ensure a constant need for improvement complexity and ciphers' security by trying to break them. Sometimes they do not instantly try to break the strongest version of the cipher, but they are looking for weaknesses by splitting it and independently checking all algorithm components. Often cryptanalysts also attempt to break cipher by using its weaker version or configuration. There are plenty of mechanisms and approaches to cryptanalysis to solve those challenges. One of them is SAT-based method, that uses logical encoding. In this article, we present our wide analysis and new experimental results of SATbased, direct cryptanalysis of the RC5 cipher. To perform such actions on the given cipher, we initially create a propositional logical formula, that describes and represents the entire RC5 algorithm. The second step is to randomly generate key and plaintext. Then we determine the ciphertext. In the last step of our computations, we use SAT-solvers. They are particularly designed tools for checking the satisfiability of the Boolean formulas. In our research, we make cryptanalysis of RC5 cipher in the case with plaintext and ciphertext. To get the best result, we compared many SATsolvers and choose several. Some of them were relatively old, but still very efficient and some were modern and popular.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于SAT的RC5密码分析
保持通信网络中使用的密码的适当安全级别是当今一个非常重要的问题。密码分析师通过尝试破解密码来确保不断需要改进密码的复杂性和安全性。有时他们不会立即尝试破解最强版本的密码,但他们会通过拆分密码并独立检查所有算法组件来寻找弱点。通常,密码分析人员还试图通过使用较弱的版本或配置来破解密码。密码分析有很多机制和方法来解决这些挑战。其中一种是基于sat的方法,它使用逻辑编码。在本文中,我们介绍了基于sat的RC5密码直接分析的广泛分析和新的实验结果。为了对给定的密码执行这样的操作,我们首先创建一个命题逻辑公式,它描述并表示整个RC5算法。第二步是随机生成密钥和明文。然后我们确定密文。在计算的最后一步,我们使用sat求解器。它们是专门为检查布尔公式的可满足性而设计的工具。在我们的研究中,我们对RC5密码进行了明文和密文两种情况下的密码分析。为了得到最好的结果,我们比较了许多satv求解器并从中选择了几个。有些比较旧,但仍然很有效率,有些很现代,很受欢迎。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information and Organizational Sciences
Journal of Information and Organizational Sciences COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
1.10
自引率
0.00%
发文量
14
审稿时长
12 weeks
期刊最新文献
Employing a Time Series Forecasting Model for Tourism Demand Using ANFIS A Mobile Based Pharmacy Store Location-aware System The Contribution of Women on Corporate Boards Croatian Journals Covered by SCIE/SSCI Towards an Improved Framework for E-Risk Management for Digital Financial Services (DFS) in Ugandan Banks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1