Hide metadata

dc.date.accessioned2013-03-07T11:00:54Z
dc.date.available2013-03-07T11:00:54Z
dc.date.issued2012en_US
dc.date.submitted2012-11-08en_US
dc.identifier.citationNossum, Vegard. SAT-based preimage attacks on SHA-1. Masteroppgave, University of Oslo, 2012en_US
dc.identifier.urihttp://hdl.handle.net/10852/34912
dc.description.abstractHash functions are important cryptographic primitives which map arbitrarily long messages to fixed-length message digests in such a way that: (1) it is easy to compute the message digest given a message, while (2) inverting the hashing process (e.g. finding a message that maps to a specific message digest) is hard. One attack against a hash function is an algorithm that nevertheless manages to invert the hashing process. Hash functions are used in e.g. authentication, digital signatures, and key exchange. A popular hash function used in many practical application scenarios is the Secure Hash Algorithm (SHA-1). In this thesis we investigate the current state of the art in carrying out preimage attacks against SHA-1 using SAT solvers, and we attempt to find out if there is any room for improvement in either the encoding or the solving processes. We run a series of experiments using SAT solvers on encodings of reduced-difficulty versions of SHA-1. Each experiment tests one aspect of the encoding or solving process, such as e.g. determining whether there exists an optimal restart interval or determining which branching heuristic leads to the best average solving time. An important part of our work is to use statistically sound methods, i.e. hypothesis tests which take sample size and variation into account. Our most important result is a new encoding of 32-bit modular addition which significantly reduces the time it takes the SAT solver to find a solution compared to previously known encodings. Other results include the fact that reducing the absolute size of the search space by fixing bits of the message up to a certain point actually results in an instance that is harder for the SAT solver to solve. We have also identified some slight improvements to the parameters used by the heuristics of the solver MiniSat; for example, contrary to assertions made in the literature, we find that using longer restart intervals improves the running time of the solver.eng
dc.language.isoengen_US
dc.titleSAT-based preimage attacks on SHA-1en_US
dc.typeMaster thesisen_US
dc.date.updated2013-03-06en_US
dc.creator.authorNossum, Vegarden_US
dc.subject.nsiVDP::420en_US
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft.au=Nossum, Vegard&rft.title=SAT-based preimage attacks on SHA-1&rft.inst=University of Oslo&rft.date=2012&rft.degree=Masteroppgaveen_US
dc.identifier.urnURN:NBN:no-33622en_US
dc.type.documentMasteroppgaveen_US
dc.identifier.duo171922en_US
dc.contributor.supervisorFabio Massacci, Martin Gieseen_US
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/34912/1/thesis-output.pdf


Files in this item

Appears in the following Collection

Hide metadata