Using SAT solvers and brute force approach to recover AES key from partial key schedule images

DSpace/Manakin Repository

Show simple item record

dc.contributor.advisor Focardi, Riccardo it_IT
dc.contributor.author Martignon, Nicolas Pietro <1998> it_IT
dc.date.accessioned 2022-09-28 it_IT
dc.date.accessioned 2023-02-22T10:57:27Z
dc.date.available 2023-02-22T10:57:27Z
dc.date.issued 2022-10-20 it_IT
dc.identifier.uri http://hdl.handle.net/10579/22393
dc.description.abstract Recovering an AES key exploiting the redundancy of key material inherent in the AES key schedule is a topic widely discussed in the scientific literature. Specifically, there are many papers that analyze the aforementioned problem starting from a corrupt key schedule, this scenario is very frequent if a cold boot attack is carried out in which a corrupt dump of the ram memory is performed. In these articles, different techniques are used to derive the AES key including the use of SAT solver and MAX SAT solver, tools that aim to solve the problem of Boolean satisfiability. In this thesis, on the other hand, we want to analyze a more general case, i.e., starting from a partial key schedule and obtaining its AES key. Different techniques will be analyzed and combined including the use of SAT solver tools, and brute force algorithm, with the aim of minimizing the time for key recovery. it_IT
dc.language.iso en it_IT
dc.publisher Università Ca' Foscari Venezia it_IT
dc.rights © Nicolas Pietro Martignon, 2022 it_IT
dc.title Using SAT solvers and brute force approach to recover AES key from partial key schedule images it_IT
dc.title.alternative Using SAT solvers and brute force approach to recover AES key from partial key schedule images it_IT
dc.type Master's Degree Thesis it_IT
dc.degree.name Informatica - computer science it_IT
dc.degree.level Laurea magistrale it_IT
dc.degree.grantor Dipartimento di Scienze Ambientali, Informatica e Statistica it_IT
dc.description.academicyear 2021-2022_appello_171022 it_IT
dc.rights.accessrights openAccess it_IT
dc.thesis.matricno 870034 it_IT
dc.subject.miur INF/01 INFORMATICA it_IT
dc.description.note Recovering an AES key exploiting the redundancy of key material inherent in the AES key schedule is a topic widely discussed in the scientifi literature. Sp ecifially, there are many pap ers that analyze the aforementioned problem starting from a corrupt key schedule, this scenario is very frequent if a cold b o ot attack is carried out in which a corrupt dump of the ram memory is p erformed. In these articles, diffrent techniques are used to derive the AES key including the use of SAT solver and MAX SAT solver, to ols that aim to solve the problem of Bo olean satisfibility. In this thesis, on the other hand, we want to analyze a more general case, i.e., starting from a partial key schedule and obtaining its AES key. Diffrent techniques will b e analyzed and combined including the u se of SAT solver to ols, and brute force algorithm, with the aim of minimizing the time for key recovery. it_IT
dc.degree.discipline it_IT
dc.contributor.co-advisor it_IT
dc.date.embargoend it_IT
dc.provenance.upload Nicolas Pietro Martignon (870034@stud.unive.it), 2022-09-28 it_IT
dc.provenance.plagiarycheck Riccardo Focardi (focardi@unive.it), 2022-10-17 it_IT


Files in this item

This item appears in the following Collection(s)

Show simple item record