23.11.2014 Views

Attacking AES via SAT - Department of Computer Science

Attacking AES via SAT - Department of Computer Science

Attacking AES via SAT - Department of Computer Science

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>AES</strong><br />

<strong>AES</strong> and <strong>SAT</strong><br />

Translation <strong>of</strong> <strong>AES</strong> into <strong>SAT</strong><br />

Evaluation <strong>of</strong> initial translation<br />

Future work<br />

<strong>AES</strong> at a high level is made up <strong>of</strong> the following basic operations:<br />

R : {0, 1} 128 → {0, 1} 128<br />

KS : {0, 1} 128 × {1, . . . , 10} → {0, 1} 128<br />

<strong>AES</strong> : {0, 1} 128 × {0, 1} 128 → {0, 1} 128<br />

where R is the round operation, made up <strong>of</strong> smaller operations<br />

including the cryptographically important Sbox, and KS is the key<br />

schedule, which generates a round key for each round.<br />

Matthew Gwynne<br />

<strong>Attacking</strong> <strong>AES</strong> <strong>via</strong> <strong>SAT</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!