dc.contributor.advisor |
Focardi, Riccardo |
it_IT |
dc.contributor.author |
Martignon, Nicolas Pietro <1998> |
it_IT |
dc.date.accessioned |
2022-09-28 |
it_IT |
dc.date.accessioned |
2023-02-22T10:57:27Z |
|
dc.date.available |
2023-02-22T10:57:27Z |
|
dc.date.issued |
2022-10-20 |
it_IT |
dc.identifier.uri |
http://hdl.handle.net/10579/22393 |
|
dc.description.abstract |
Recovering an AES key exploiting the redundancy
of key material inherent in the AES key schedule is a topic widely discussed in the scientific literature.
Specifically, there are many papers that analyze the aforementioned problem starting from a corrupt key schedule, this scenario is very frequent if a cold boot attack is carried out in which a corrupt dump of the ram memory is performed.
In these articles, different techniques are used to derive the AES key including the use of SAT solver and MAX SAT solver, tools that aim to solve the problem of Boolean satisfiability.
In this thesis, on the other hand, we want to analyze a more general case, i.e., starting from a partial key schedule and obtaining its AES key.
Different techniques will be analyzed and combined including the use of SAT solver tools, and brute force algorithm, with the aim of minimizing the time for key recovery. |
it_IT |
dc.language.iso |
en |
it_IT |
dc.publisher |
Università Ca' Foscari Venezia |
it_IT |
dc.rights |
© Nicolas Pietro Martignon, 2022 |
it_IT |
dc.title |
Using SAT solvers and brute force approach to recover AES key from partial key schedule
images |
it_IT |
dc.title.alternative |
Using SAT solvers and brute force approach to recover AES key from partial key schedule images |
it_IT |
dc.type |
Master's Degree Thesis |
it_IT |
dc.degree.name |
Informatica - computer science |
it_IT |
dc.degree.level |
Laurea magistrale |
it_IT |
dc.degree.grantor |
Dipartimento di Scienze Ambientali, Informatica e Statistica |
it_IT |
dc.description.academicyear |
2021-2022_appello_171022 |
it_IT |
dc.rights.accessrights |
openAccess |
it_IT |
dc.thesis.matricno |
870034 |
it_IT |
dc.subject.miur |
INF/01 INFORMATICA |
it_IT |
dc.description.note |
Recovering an AES key exploiting the redundancy of key material inherent in the
AES key schedule is a topic widely discussed in the scientifi literature. Sp ecifially,
there are many pap ers that analyze the aforementioned problem starting from a
corrupt key schedule, this scenario is very frequent if a cold b o ot attack is carried
out in which a corrupt dump of the ram memory is p erformed. In these articles,
diffrent techniques are used to derive the AES key including the use of SAT solver
and MAX SAT solver, to ols that aim to solve the problem of Bo olean satisfibility.
In this thesis, on the other hand, we want to analyze a more general case, i.e., starting from a partial key schedule and obtaining its AES key. Diffrent techniques will
b e analyzed and combined including the u se of SAT solver to ols, and brute force
algorithm, with the aim of minimizing the time for key recovery. |
it_IT |
dc.degree.discipline |
|
it_IT |
dc.contributor.co-advisor |
|
it_IT |
dc.date.embargoend |
|
it_IT |
dc.provenance.upload |
Nicolas Pietro Martignon (870034@stud.unive.it), 2022-09-28 |
it_IT |
dc.provenance.plagiarycheck |
Riccardo Focardi (focardi@unive.it), 2022-10-17 |
it_IT |