Parallel Framework for Evolutionary Black- box Optimization with - - PowerPoint PPT Presentation

parallel framework for evolutionary black box
SMART_READER_LITE
LIVE PREVIEW

Parallel Framework for Evolutionary Black- box Optimization with - - PowerPoint PPT Presentation

Parallel Framework for Evolutionary Black- box Optimization with Application to Algebraic Cryptanalysis presenter: Stepan Kochemazov A. Pavlenko, A. Semenov, V. Ulyantsev, O. Zaikin {alpavlenko,ulyantsev}@corp.ifmo.ru biclop.rambler@yandex.ru


slide-1
SLIDE 1

Parallel Framework for Evolutionary Black- box Optimization with Application to Algebraic Cryptanalysis

  • A. Pavlenko, A. Semenov, V. Ulyantsev, O. Zaikin

{alpavlenko,ulyantsev}@corp.ifmo.ru biclop.rambler@yandex.ru zaikin.icc@gmail.com ITMO University, St. Petersburg, Russia ISDCT SB RAS, Irkutsk, Russia

presenter: Stepan Kochemazov

slide-2
SLIDE 2
  • There are a lot of ways to encode and

to decode information

  • HTTPS, mobile traffic …
  • man in the middle
  • Algebraic cryptanalysis is a way of

analyzing and breaking ciphers

  • Type of attacks:
  • Brute-force attack
  • Guess-and-determine attack

Cryptanalysis

2

slide-3
SLIDE 3

Cipher A5/1 – used in 2G protocol

Research question: how practically hard it is to decrypt some encrypted text?

Stream ciphers and cryptanalysis

b1 b2 b3

b1, b2, b3 – clocking bits X = XA ∪ XB ∪ XC X = {x1, x2, …, x64} Y = {y1, y2, …, y128}

A B C

f : {0,1}64 → {0,1}128 f (x) = y

3

slide-4
SLIDE 4
  • Boolean SATisfiability – first known NP-complete

problem

  • A dozen of applicable SAT-solvers
  • minisat, lingeling, ROKK …
  • SAT, UNSAT
  • Annular competitions in solving SAT!

good idea to translate hard problem to SAT

SAT and SAT-solvers

4

slide-5
SLIDE 5

Encode to SAT using Transalg*

Cipher A5/1 Transalg program SAT-formula

*Transalg: [Otpuschennikov, I., Semenov, A., Gribanova, I., Zaikin, O., Kochemazov, S.: Encoding Cryptographic Functions to SAT Using TRANSALG System. In: ECAI 2016. FAIA, vol. 285, pp. 1594–1595 (2016)]

b1 b2 b3

… … b1, b2, b3 – clocking bits X = XA ∪ XB ∪ XC X = {x1, x2, …, x64} Y = {y1, y2, …, y128}

A B C

manually

automatically

5

slide-6
SLIDE 6

Example of breaking for Trivium 64

PLingeling Treengeling task 1 interrupted interrupted task 2 interrupted 3d 2h task 3 interrupted 4d 10h task 4 interrupted interrupted task 5 interrupted interrupted CPU: AMD Opteron 6276 @ 2.3 GHz x32 Timelimit: 7 days Guess-and-determine attack 2d 6h 3d 19h 15h 1d 21h 4d 3h

6

slide-7
SLIDE 7
  • 2. Guess-and-determine attacks

7

slide-8
SLIDE 8

Guess-and-Determine. Backdoor

B = { x1, x2, x3, x4, x5, x9, x12, x16, x19, x20, x21, x22, x23, x24, x25, x27, x28, x30, x36, x41, x42, x43, x47, x48, x49, x50, x52, x60 }

8

slide-9
SLIDE 9

Guess-and-Determine. Guess

B = { x1, x2, x3, x4, x5, x9, x12, x16, x19, x20, x21, x22, x23, x24, x25, x27, x28, x30, x36, x41, x42, x43, x47, x48, x49, x50, x52, x60 }

9

slide-10
SLIDE 10

Guess-and-Determine. Determine

⇒ Result: UNSAT

Time: 1.243 c solver.solve

10

slide-11
SLIDE 11

Guess-and-Determine. Definition

τ1 = 1.243 c

$

%&' ()

τ% ≪ 𝑈

,-./012-30

where 𝑡 = |𝐶| ,

11

slide-12
SLIDE 12

How to construct a efficient backdoor?

12

slide-13
SLIDE 13

Key stream length

Backdoor-based Decomposition

13

s = |B| – power of backdoor set

slide-14
SLIDE 14

Monte-Carlo Sampling

14

slide-15
SLIDE 15

Fitness function

If the task is solved in time T, then ξ = 1, else ξ = 0

Estimation technics: [Semenov, A., Zaikin, O., Otpuschennikov, I., Kochemazov, S., Ignatiev, A.: On Cryptographic Attacks Using Backdoors for

  • SAT. In: Proc. of AAAI 2018. pp. 6641–6648 (2018)]

Estimation of breaking time = Fitness value

15

Evaluating

slide-16
SLIDE 16
  • Analyzing stream cyphers is a hard

problem

  • We can translate the attack to SAT
  • We can speedup the SAT-based attack

using backdoor

  • Selecting the efficient backdoor is a

hard problem

  • But there is a way to estimate the

attack time for a given backdoor Estimation of breaking time

16

magic

Intermediate sum-up

slide-17
SLIDE 17
  • 3. Framework for minimizing a

fitness function

17

slide-18
SLIDE 18

Framework scheme

18

slide-19
SLIDE 19

Algorithm module

B = { x1, x2, x3, x4, x5, x9, x12, x16, x19, x20, x21, x22, x23, x24, x25, x27, x28, x30, x36, x41, x42, x43, x47, x48, x49, x50, x52, x60 }

Individual: bit vector, which presents a backdoor set We apply Framework supports (1+1)-EA GA (Elitism) (𝜈, 𝜇)-EA (𝜈+𝜇)-EA

19

Tabu Search Simulated Annealing

slide-20
SLIDE 20

Predictive function module

20

slide-21
SLIDE 21

Concurrency module

21

𝑁; = <

;, k – count of nodes

slide-22
SLIDE 22

Solver module

22

Implemented wrappers:

  • MiniSat
  • Lingeling
  • Plingeling
  • Treengeling
  • ROKK
  • CryptoMiniSat
  • PaInLeSS

Result: SAT Time: 1.243 c Result: SAT Time: 2.311 c Result: UNSAT Time: 0.526 c

slide-23
SLIDE 23

tk – time of solving task k If the task is solved in time T, then ξ = 1, else ξ = 0

Predictive function module. Evaluating

23

slide-24
SLIDE 24

Experimental results. First function

ALIAS* EvoGuess (1+1)-EA |B| Attack time (s) |B| Attack time (s) Grain v1 160/160 109 4.04e+30 100 7.51e+30 Trivium 288/300 144 1.40e+41 143 3.51e+43 Mickey 200/250 158 1.56e+48 169 1.77e+51

24

*ALLIAS: [Zaikin O., Kochemazov S. Pseudo-Boolean Black-Box Optimization Methods in the Context of Divide-and-Conquer Approach to Solving Hard SAT Instances. In DEStech Transactions on Computer Science and Engineering, pp. 76-87 (2018)]

slide-25
SLIDE 25

Experimental results. Second function

EvoGuess (1+1)-EA EvoGuess GA |B| Attack time (s) |B| Attack time (s) Grain v1 160/160 104 4.71e+32 103 7.23e+31 Trivium 288/300 136 1.52e+43 146 5.08e+43 Mickey 200/250 159 9.73e+50 152 8.18e+50

25

slide-26
SLIDE 26
  • We propose new framework for algebraic cryptanalysis.
  • We used (1+1)-EA and GA to construct SAT-based guess-and-determine

attacks on symmetric ciphers.

  • We could not outperform ALIAS, so we are planning to significantly

extend the framework’s spectrum of pseudo-Boolean optimization algorithms and improve the search for guessed bits via tuning parameters of the used SAT solvers.

  • Supposed by the Russian Science Foundation (project No 18-71-00150)

Conclusion

26

slide-27
SLIDE 27

27

Thank you for attention!

Artem Pavlenko, Alexander Semenov, Vladimir Ulyantsev, Oleg Zaikin {alpavlenko,ulyantsev}@corp.ifmo.ru biclop.rambler@yandex.ru zaikin.icc@gmail.com instagram.com/itmo.ctlab presenter: Stepan Kochemazov