TY - JOUR
T1 - CryptoSAT
T2 - A tool for SAT-based cryptanalysis
AU - Lafitte, Frédéric
N1 - Publisher Copyright:
© 2018 The Institution of Engineering and Technology.
PY - 2018/11/1
Y1 - 2018/11/1
N2 - The security of symmetric key primitives comes from their exposure to public scrutiny in the context of competitions such as Advanced Encryption Standard, Secure Hash Algorithm 3, or currently CAESAR. However, due to the increasing number of primitives subjected to these competitions, the quality of the scrutiny relies on the availability of automated tools. Although SAT solvers have already proved useful for the automated analysis of these primitives, there is a lack of practical software tools for this purpose. This study describes a framework that aims to make SAT-based analyses accessible to cryptographers. The framework is implemented in a free open-source tool called CryptoSAT which is available in the public domain.
AB - The security of symmetric key primitives comes from their exposure to public scrutiny in the context of competitions such as Advanced Encryption Standard, Secure Hash Algorithm 3, or currently CAESAR. However, due to the increasing number of primitives subjected to these competitions, the quality of the scrutiny relies on the availability of automated tools. Although SAT solvers have already proved useful for the automated analysis of these primitives, there is a lack of practical software tools for this purpose. This study describes a framework that aims to make SAT-based analyses accessible to cryptographers. The framework is implemented in a free open-source tool called CryptoSAT which is available in the public domain.
UR - http://www.scopus.com/inward/record.url?scp=85055883978&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs.2017.0176
DO - 10.1049/iet-ifs.2017.0176
M3 - Article
AN - SCOPUS:85055883978
SN - 1751-8709
VL - 12
SP - 463
EP - 474
JO - IET Information Security
JF - IET Information Security
IS - 6
ER -