Complete SAT based cryptanalysis of RC5 cipher

A Soboń, M Kurkowski, S Stachowiak - Journal of Information and …, 2020 - hrcak.srce.hr
Sažetak Kee** the proper security level of ciphers used in communication networks is
today a very important problem. Cryptanalysts ensure a constant need for improvement …

SAT-based cryptanalysis of Salsa20 cipher

S Stachowiak, M Kurkowski, A Soboń - … (CORES, IP&C, ACS)-June 28-30 …, 2022 - Springer
Modeling through Boolean encoding is often used for the investigation of various kinds of
algorithms or other computer systems. Such an approach can be used successfully to …

New results in direct SAT-based cryptanalysis of DES-like ciphers

M Chowaniec, M Kurkowski, M Mazur - Advances in Soft and Hard …, 2019 - Springer
SAT based cryptanalysis is one of efficient ways to investigate about desire properties of
symmetric ciphers. In this paper we show our research and new experimental results in the …

Towards complete SAT-based cryptanalysis of RC5 cipher

A Soboń, M Kurkowski… - 2019 IEEE 15th …, 2019 - ieeexplore.ieee.org
There are many concepts and methods of ciphers cryptanalysis. It depends on the type of
the cipher investigated or sometimes modes of operations. Usually, cryptanalysts would like …

New results in SAT–cryptanalysis of the AES

S Stachowiak, M Kurkowski… - 2022 IEEE 16th …, 2022 - ieeexplore.ieee.org
Many significant computational problems can be converted to SAT problems. Although these
problems are often encoded by formulas with hundreds of thousands of clauses and …

SAT vs. Substitution Boxes of DES like Ciphers

S Stachowiak, M Kurkowski… - 2021 IEEE 30th …, 2021 - ieeexplore.ieee.org
One of the applied methods of symmetric ciphers investigations is cryptanalysis that uses the
SAT problem. In this case, cipher testing starts with encoding the cipher's algorithm into a …

Internal state recovery attack on stream ciphers: Breaking BIVIUM

S Shahapure, V Sule, RD Daruwala - International Conference on Security …, 2019 - Springer
This paper proposes an attack on shift register based stream ciphers. The attack consists of
recovering the internal state of the registers at a starting clock instant from which the output …

Cryptanalysis of Bivium using a Boolean all solution solver

V Sule, A Yadav - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Cryptanalysis of Bivium is presented with the help of a new Boolean system solver
algorithm. This algorithm uses a Boolean equation model of Bivium for a known keystream …

[PDF][PDF] SAT-kryptoanaliza wybranych algorytmów kryptografii symetrycznej

MS Stachowiak - 2022 - bip.sggw.edu.pl
W dzisiejszych sieciach i systemach komputerowych, z oczywistych względów, wymaga się
zapewnienia odpowiedniej ochrony przesyłanych lub gromadzonych danych. Do celów tych …

[PDF][PDF] Direct SAT-Based Cryptanalysis of Some Symmetric Ciphers

M Kurkowski - MATHEMATICAL MODELLING IN PHYSICS AND …, 2017 - km.pcz.pl
Direct SAT-Based Cryptanalysis of Some Symmetric Ciphers Page 1 Cryptanalysis of symmetric
ciphers Feistel transformation and DES algorithm Boolean encoding Experiments and future …