Logical analysis of hash functions

D Jovanović, P Janičić - International Workshop on Frontiers of Combining …, 2005 - Springer
In this paper we report on a novel approach for uniform encoding of hash functions (but also
other cryptographic functions) into propositional logic formulae, and reducing cryptanalysis …

Applications of SAT solvers to cryptanalysis of hash functions

I Mironov, L Zhang - Theory and Applications of Satisfiability Testing-SAT …, 2006 - Springer
Several standard cryptographic hash functions were broken in 2005. Some essential
building blocks of these attacks lend themselves well to automation by encoding them as …

Logical reasoning to detect weaknesses about SHA-1 and MD4/5

F Legendre, G Dequen, M Krajecki - Cryptology ePrint Archive, 2014 - eprint.iacr.org
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more
numerous because of its conceptual simplicity and ability to express a large set of various …

Encoding hash functions as a sat problem

F Legendre, G Dequen… - 2012 IEEE 24th …, 2012 - ieeexplore.ieee.org
The SATisfiability Problem is a core problem in mathematical logic and computing theory. In
the last years, progresses have led it to be a great and competitive approach to practically …

Extending SAT solvers to cryptographic problems

M Soos, K Nohl, C Castelluccia - International Conference on Theory and …, 2009 - Springer
Cryptography ensures the confidentiality and authenticity of information but often relies on
unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain …

Cdcl (crypto) sat solvers for cryptanalysis

S Nejati, V Ganesh - arXiv preprint arXiv:2005.13415, 2020 - arxiv.org
Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-
driven clause-learning Boolean satisfiability (CDCL SAT) solvers on industrial problems …

Applications of SAT solvers in cryptanalysis: finding weak keys and preimages

F Lafitte, J Nakahara Jr… - Journal on Satisfiability …, 2014 - content.iospress.com
This paper investigates the power of SAT solvers in cryptanalysis. The contributions are two-
fold and are relevant to both theory and practice. First, we introduce an efficient, generic and …

Inversion Attacks on Secure Hash Functions Using sat Solvers

D De, A Kumarasubramanian… - Theory and Applications of …, 2007 - Springer
Inverting a function f at a given point y in its range involves finding any x in the domain such
that f (x)= y. This is a general problem. We wish to find a heuristic for inverting those …

Translation of algorithmic descriptions of discrete functions to SAT with applications to cryptanalysis problems

A Semenov, I Otpuschennikov… - Logical Methods in …, 2020 - lmcs.episciences.org
In the present paper, we propose a technology for translating algorithmic descriptions of
discrete functions to SAT. The proposed technology is aimed at applications in algebraic …

Logical cryptanalysis as a SAT problem

F Massacci, L Marraro - Journal of Automated Reasoning, 2000 - Springer
Cryptographic algorithms play a key role in computer security and the formal analysis of their
robustness is of utmost importance. Yet, logic and automated reasoning tools are seldom …