Logical cryptanalysis as a SAT problem: Encoding and analysis of the U.S. data encryption standard

F. Massacci, L. Marraro

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seldom used in the analysis of a cipher, and thus one cannot often get the desired formal assurance that the cipher is free from unwanted properties that may weaken its strength. In this paper, we claim that one can feasibly encode the low-level properties of state-of-the-art cryptographic algorithms as SAT problems and then use efficient automated theorem-proving systems and SAT-solvers for reasoning about them. We call this approach logical cryptanalysis. In this framework, for instance, finding a model for a formula encoding an algorithm is equivalent to finding a key with a cryptanalytic attack. Other important properties, such as cipher integrity or algebraic closure, can also be captured as SAT problems or as quantified boolean formulae. SAT benchmarks based on the encoding of cryptographic algorithms can be used to effectively combine features of "real-world" problems and randomly generated problems. Here we present a case study on the U.S. Data Encryption Standard (DES) and show how to obtain a manageable encoding of its properties. We have also tested three SAT provers, TABLEAU by Crawford and Auton, SATO by Zhang, and rel-SAT by Bayardo and Schrag, on the encoding of DES, and we discuss the reasons behind their different performance. A discussion of open problems and future research concludes the paper. © 2000 Kluwer Academic Publishers.
Original languageEnglish
Pages (from-to)165-203
JournalJournal of Automated Reasoning
Volume24
Issue number1-2
DOIs
Publication statusPublished - 2000
Externally publishedYes

Fingerprint

Dive into the research topics of 'Logical cryptanalysis as a SAT problem: Encoding and analysis of the U.S. data encryption standard'. Together they form a unique fingerprint.

Cite this