{"title":"AES的SAT密码分析新成果","authors":"Sylwia Stachowiak, M. Kurkowski, Artur Soboń","doi":"10.1109/Informatics57926.2022.10083461","DOIUrl":null,"url":null,"abstract":"Many significant computational problems can be converted to SAT problems. Although these problems are often encoded by formulas with hundreds of thousands of clauses and propositional variables such formulas can sometimes be effectively solved by contemporary SAT solvers. Such solvers can be successfully used for cryptanalysis of symmetric ciphers. In this case, operations of the cipher are written in the form of Boolean formulas. Then, together with randomly selected bits of the plaintext and the key, it is transformed into a set of clauses corresponding to the encryption of the given algorithm. The ciphertext obtained using SAT solvers is used to create a set of decryption clauses. Using the SAT solver again, we go to the cryptanalysis of the cipher with the selected open text, looking for the bits of the encryption key. In this article, we examine how SAT techniques behave to the AES cipher, the current standard for symmetric encryption. We also compare the results obtained in this case by several SAT solvers.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"New results in SAT – cryptanalysis of the AES\",\"authors\":\"Sylwia Stachowiak, M. Kurkowski, Artur Soboń\",\"doi\":\"10.1109/Informatics57926.2022.10083461\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many significant computational problems can be converted to SAT problems. Although these problems are often encoded by formulas with hundreds of thousands of clauses and propositional variables such formulas can sometimes be effectively solved by contemporary SAT solvers. Such solvers can be successfully used for cryptanalysis of symmetric ciphers. In this case, operations of the cipher are written in the form of Boolean formulas. Then, together with randomly selected bits of the plaintext and the key, it is transformed into a set of clauses corresponding to the encryption of the given algorithm. The ciphertext obtained using SAT solvers is used to create a set of decryption clauses. Using the SAT solver again, we go to the cryptanalysis of the cipher with the selected open text, looking for the bits of the encryption key. In this article, we examine how SAT techniques behave to the AES cipher, the current standard for symmetric encryption. We also compare the results obtained in this case by several SAT solvers.\",\"PeriodicalId\":101488,\"journal\":{\"name\":\"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)\",\"volume\":\"182 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Informatics57926.2022.10083461\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Informatics57926.2022.10083461","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Many significant computational problems can be converted to SAT problems. Although these problems are often encoded by formulas with hundreds of thousands of clauses and propositional variables such formulas can sometimes be effectively solved by contemporary SAT solvers. Such solvers can be successfully used for cryptanalysis of symmetric ciphers. In this case, operations of the cipher are written in the form of Boolean formulas. Then, together with randomly selected bits of the plaintext and the key, it is transformed into a set of clauses corresponding to the encryption of the given algorithm. The ciphertext obtained using SAT solvers is used to create a set of decryption clauses. Using the SAT solver again, we go to the cryptanalysis of the cipher with the selected open text, looking for the bits of the encryption key. In this article, we examine how SAT techniques behave to the AES cipher, the current standard for symmetric encryption. We also compare the results obtained in this case by several SAT solvers.