1 round 3 steps on SHA-1 (23 steps)
Fixed Hash:
0x00000000 0x00000000 0x00000000 0x00000000
Input found:
0x35691c1a 0xead7eb26 0xcac76b0e 0x00000000
0x51e43c45 0xaa8bc12a 0xdb8fa47c 0x00000000
0x637c1517 0x80abea2e 0x9339f44e 0x00000000
0x6367caee 0xbc8920ec 0x1084c8d7 0x45075a9e
6 CONCLUSIONS
In this paper
5
, we propose a based logical approach
to bring out some cryptographic weaknesses in hash
functions. Indeed, we noticed that model the function
in a binary field (F
2
), allows to point out several vari-
ables which have not a random behavior, as expected
in a hashing process. In this context, certain internal
words, especially carries, are weak and the function
may be tackled by these partially open doors to get
new information.
We confirmed this point through an experimentation
where we foundequivalences, quasi-equivalencesand
quasi-implication by two different ways: an auto-
matic logical reasoning and a probabilistic approach.
Thanks to the first technique, we show factual rela-
tions that could be used in a general case. More-
over, the probabilistic method allow to outline an
overview of quasi-relation. This attests that the vari-
ables are strongly correlated and their relations can
be exploited to gather new information. As a re-
sult, we presented a set of equivalences and quasi-
equivalences and explain why they exist through an
observation of the influence of round constants. Fi-
nally, we talked about logical cryptanalysis by im-
porting these weaknesses in SAT formulas. In this
sense, we show how to improve an heuristic in SAT
solvers and show practical preimage attacks against
SHA-1.
In our knowledge, this is the only approach where
logical and probabilistic deductions highlights weak-
nesses in hash functions. Moreover, our method is
generic and so we can also export our method on
others cryptographic schemes and underline bitwise
weaknesses that could be exploited. Interestingly, im-
proving heuristic in SAT solvers seems to be a very
hopeful way to improve practical preimage attacks as,
nowadays, it does not exist any dedicated solver to
logical cryptanalysis.
5
This work is supported by the Direction G´en´erale de
l’Armement : http://www.defense.gouv.fr/dga
REFERENCES
Bard, G. V., Courtois, N. T., and Jefferson., C. (2007). Ef-
ficient methods for conversion and solution of sparse
systems of low-degree multivariate polynomials over
gf(2) via sat-solvers. Cryptology ePrint Archive, Re-
port 2007/024.
Bettale, L., Faug`ere, J.-C., and Perret, L. (2012). Solving
polynomial systems over finite fields: improved anal-
ysis of the hybrid approach. In ISSAC, pages 67–74.
Biere, A., Heule, M. J. H., Maaren, H. V., and Walsh, T.,
editors (2009). Handbook of Satisfiability, volume
185 of Frontiers in Artificial Intelligence and Appli-
cations. IOS Press.
Biham, E. and Shamir, A. (1990). Differential cryptanalysis
of des-like cryptosystems. In CRYPTO, pages 2–21.
Canni`ere, C. D. and Rechberger, C. (2008). Preimages for
reduced sha-0 and sha-1. In CRYPTO, pages 179–202.
Christian, R. (2010). Second-preimage analysis of reduced
sha-1. In Proceedings of the Australasian conference
on Information security and privacy, pages 104–116.
Cook, S. A. (1971). The Complexity of Theorem Proving
Procedures. In 3
rd
ACM Symp. on Theory of Comput-
ing, Ohio, pages 151–158.
Damg˚ard, I. (1989). A design principle for hash functions.
In CRYPTO, pages 416–427.
Davis, M., Logemann, G., and Loveland, D. (1962). A Ma-
chine Program for Theorem-Proving. Journal Associ-
ation for Computing Machine, (5):394–397.
De, D., Kumarasubramanian, A., and Venkatesan, R.
(2007). Inversion attacks on secure hash functions us-
ing satsolvers. In SAT, pages 377–382.
Faug`ere, J.-C. and Joux, A.(2003). Algebraic Cryptanalysis
of Hidden Field Equation (HFE) Cryptosystems Using
Gr¨obner Bases. In Advances in Cryptology - CRYPTO
2003, volume 2729, pages 44–60.
Knuth, D. E. (1997). The art of computer program-
ming, volume 2 (3rd ed.): seminumerical algorithms.
Addison-Wesley Longman Publishing Co., Inc.
Legendre, F., Dequen, G., and Krajecki, M. (2012). Invert-
ing thanks to sat solving - an application on reduced-
step md*. In SECRYPT, pages 339–344.
Li, C.-M. and Anbulagan (1997). Heuristics based on unit
propagation for satisfiability problems. In the Fif-
teenth International Joint Conference on Artificial In-
telligence (IJCAI97), Nagoya (JAPAN), page 366371.
Massacci, F. and Marraro, L. (2000). Logical cryptanalysis
as a sat problem. J.Autom.Reasoning, pages 165–203.
Matsui, M. and Yamagishi, A. (1992). A new method
for known plaintext attack of feal cipher. In EURO-
CRYPT, pages 81–91.
Merkle, R. (1989). One way hash functions and des. In
CRYPTO, pages 428–446.
Mironov, I. and Zhang, L. (2006). Applications of sat
solvers to cryptanalysis of hash functions. In SAT,
pages 102–115.
Zhang, L., Madigan, C., Moskewicz, M., and Malik, S.
(2001). Efficient conflict driven learning in a boolean
satisfiability solver. In ICCAD.
FromaLogicalApproachtoInternalStatesofHashFunctions-HowSATProblemCanHelptoUnderstandSHA-*and
MD*
443