ejeai Open Access Journal

European Journal of Emerging Artificial Intelligence

eISSN: Applied
Publication Frequency : 2 Issues per year.

  • Peer Reviewed & International Journal
Table of Content
Issues (Year-wise)
Loading…

Open Access iconOpen Access

ARTICLE

LEVERAGING CUBE-AND-CONQUER FOR CRYPTOGRAPHIC HASH FUNCTION PREIMAGE DISCOVERY: A SAT-BASED CRYPTANALYSIS PERSPECTIVE

1 School of Computing, National University of Singapore, Singapore
2 Department of Engineering, Imperial College London, United Kingdom

Citations: Loading…
ABSTRACT VIEWS: 24   |   FILE VIEWS: 5   |   PDF: 5   HTML: 0   OTHER: 0   |   TOTAL: 29
Views + Downloads (Last 90 days)
Cumulative % included

Abstract

Cryptographic hash functions are cornerstones of digital security, inherently designed to resist preimage attacks—the computational challenge of finding an input that generates a specific output hash. Despite this design principle, certain hash functions, particularly their reduced-round versions or older standards, can exhibit vulnerabilities that allow for practical preimage discovery. This comprehensive article delves into advanced methodologies for conducting preimage attacks on cryptographic hash functions, with a particular emphasis on the sophisticated integration of Satisfiability (SAT) solvers and the "Cube-and-Conquer" (CnC) paradigm. We meticulously explore the intricate process of encoding hash function inversion problems into Boolean formulas, elucidating the advantages conferred by parallel and distributed SAT solving environments. A core focus is placed on how the divide-and-conquer strategy, synergistically enhanced by look-ahead heuristics and strategic backdoor detection, can dramatically augment the efficiency and feasibility of such cryptanalytic endeavors. Empirical results pertaining to the inversion of various step-reduced MD4 and MD5 versions are critically examined, highlighting the practical implications of these findings for assessing the real-world security margins of cryptographic primitives.


Keywords

Cryptographic hash functions, Preimage attacks, Cube-and-Conquer, SAT solvers

References

1. Almagro-Blanco, P., & Gir´aldez-Cru, J. (2022). Characterizing the temperature of SAT formulas. Int. J. Comput. Intell. Syst., 15(1), 69.

2. Ans´otegui, C., Bonet, M. L., Levy, J., & Many`a, F. (2008). Measuring the hardness of SAT instances. In AAAI, pp. 222–228.

3. Aoki, K., & Sasaki, Y. (2008). Preimage attacks on one-block MD4, 63-step MD5 and more. In SAC, pp. 103–119.

4. Audet, C., & Hare, W. (2017). Derivative-Free and Blackbox Optimization. Springer Series in Operations Research and Financial Engineering. Springer International Publishing.

5. Balyo, T., Froleyks, N., Heule, M., Iser, M., J ̈arvisalo, M., & Suda, M. (Eds.). (2021). Proceedings of SAT Competition 2021: Solver and Benchmark Descriptions. Department of Computer Science, University of Helsinki.


How to Cite

LEVERAGING CUBE-AND-CONQUER FOR CRYPTOGRAPHIC HASH FUNCTION PREIMAGE DISCOVERY: A SAT-BASED CRYPTANALYSIS PERSPECTIVE. (2024). European Journal of Emerging Artificial Intelligence, 1(01), 54-70. https://parthenonfrontiers.com/index.php/ejeai/article/view/48

Share Link