SAT Based Attacks on SipHash
By
Santhosh Kantharaju Siddappa
Supervised by
- Prof. Alan Kaminsky
SAT Based Attacks on SipHash By Santhosh Kantharaju Siddappa - - PowerPoint PPT Presentation
SAT Based Attacks on SipHash By Santhosh Kantharaju Siddappa Supervised by Prof. Alan Kaminsky Department of Computer Science Rochester Institute of Technology Agenda SipHash Boolean Satisfiability Problem SAT Solver Attack
SipHash-2,4 processing a 15-byte message[1]
SipRound[1]
Search Tree [2]
(~A ˅ B ˅ C) (~A ˅ ~B ˅ ~C) (~B ˅ C) (A ˅ B ˅ C) B = T (~A ˅ ~B ˅ ~C) (~B ˅ C) C = T (~A ˅ ~B ˅ ~C) A = F
(~A ˅ B ˅ C) (~A ˅ ~B ˅ ~C) (~B ˅ C) (A ˅ B ˅ C) (A ˅ ~C) B = F (~A ˅ B ˅ C) (A ˅ B ˅ C) (A ˅ ~C) A = F (A ˅ B ˅ C) (A ˅ ~C) C = ? Conflict = (~A ˄ ~B) Learnt clause = (A ˅ B)
(~A ˅ B ˅ C) A = T (~A ˅ B ˅ C) (A ˅ B ˅ C) (A ˅ ~C) C = T
Truth table for A ^ B = C
Full Adder (AˆB = S) (A˄B = C1) (CiˆS = Sum) (S˄Ci = C2) (C1˅C2 = Carryout)
Adding 64 bits (AˆB = S) (A˄B = C1) (CiˆS = Sum) (S˄Ci = C2) (C1˅C2 = Carryout)
256 255 254 253 252 …..............................196 195 194 193 128 127 126 125 124......................................... 69 68 67 66 65 640 639 638 637 636 …..............................580 579 578 577 XOR = A B C
Randomize key and message bits Compute tag for given key and message block Load message block,tag and known key bits onto CNF Generate CNF: SipHash-c,d Feed CNF to SAT solver and Record conflicts 100 times
SipHash-1,0
SipHash-1,1 SipHash-1,2
[1] Jean-Philippe Aumasson and Daniel J. Bernstein. SipHash: A fast short-input PRF. In Steven
Science, pages 489–508. Springer, 2012. [2] http://www.msoos.org/wordpress/wp-content/uploads/2011/06/soos_summerschool.pdf [3] Benjamin Bloom. SAT solver attacks on CubeHash @ONLINE, April 2010. http://www.cs.rit.edu/~ark/students/bwb1636/index.shtml [4] Tobias Eibach, Enrico Pilz, and Gunnar V¨olkel. Attacking Bivium using SAT solvers.In Proceedings of the 11th international conference on Theory and applications of satisfiability testing, SAT’08, pages 63–76, Berlin, Heidelberg, 2008. Springer-Verlag. [5] Fabio Massacci and Laura Marraro. Logical cryptanalysis as a SAT problem: the encoding of the Data Encryption Standard. In Journal of Automated Reasoning, 24:165–203, 1999.