Inversion attacks on secure hash functions using SAT solvers

  • Authors:
  • Debapratim De;Abishek Kumarasubramanian;Ramarathnam Venkatesan

  • Affiliations:
  • Cryptography, Security and Algorithms Research Group, Mircosoft Research India, Bangalore;Cryptography, Security and Algorithms Research Group, Mircosoft Research India, Bangalore;Cryptography, Security and Algorithms Research Group, Mircosoft Research India, Bangalore and Cryptography and Anti-Piracy Research Group, Microsoft Research, Redmond

  • Venue:
  • SAT'07 Proceedings of the 10th international conference on Theory and applications of satisfiability testing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Inverting a function f at a given point y in its range involves finding any x in the domain such that f(x) = y. This is a general problem. We wish to find a heuristic for inverting those functions which satisfy certain statistical properties similar to those of random functions. As an example, we choose popular secure hash functions which are expected to be hard to invert and any successful strategy to do so will be quite useful. This provides an excellent challenge for SAT solvers. We first find the limits of inverting via direct encoding of these functions as SAT: for MD4 this is one round and twelve steps and for MD5 it is one round and ten steps. Then, we show that by adding customized constraints obtained by modifying an earlier attack by Dobbertin, we can invert MD4 up to 2 rounds and 7 steps in