Cryptanalysis of the SoDark family of cipher algorithms
Buettner, Raymond R., Jr.
MetadataShow full item record
The thesis studies the security of the SoDark family of cipher algorithms through cryptanalysis. The ciphers in question are used to protect messages sent by second- and third-generation automatic link establishment (ALE) systems for high frequency radios. Radios utilizing ALE technology are in use by a multitude of government and non-government organizations worldwide. Structural attacks on up to eight rounds based on differential properties are presented and implemented in practice. An efficient logic circuit representation of the only nonlinear component of the ciphers, the S-box, is generated. That representation, converted to conjunctive normal form (CNF), is used to perform key-recovery attacks on up to four rounds with the use of Boolean satisfiability problem (SAT) solvers. The logic circuit representation is further used to develop an efficient bitslicing CUDA implementation of the cipher. Its efficiency in attacking the cipher is demonstrated. The impact of the attacks on the ALE system is considered. Finally, the thesis includes suggestions regarding a replacement cipher and ideas for further cryptanalysis.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Wang, Qichun; Tan, Chick How; Stănică, Pantelimon (2014);To resis Binary Decision Diagrams (BDD) based attacks, a Boolean function should have a high BDD size. The hidden weighted bit function (HWBF), introduced by Bryant in 1991, seems to be the simplest function with exponential ...
Wang, Qichun; Carlet, Claude; Stanica, Pantelimon; Tan, Chik How (2013-12-23);The hidden weighted bit function (HWBF), introduced by R. Bryant in IEEE Trans. Comp. 40 and revisited by D. Knuth in Vol. 4 of The Art of Computer Programming, is a function that seems to be the simplest one with expoential ...
Leader, Jeffery J.; Heyman, James E. (Monterey, California. Naval Postgraduate School, 1993); NPS-MA-93-016Applications such as stream ciphers and spread spectra require the generation of binary keystreams to implement, and the simulation of such keystreams to break. Most cryptanalytic attacks are of the known generator type, ...