Crack me if you can: Hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: A Survey

Mustafa Khairallah, Zakaria Najm, Anupam Chattopadhyay, Thomas Peyrin

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

Cryptanalysis is an essential part of cryptology. Not just is it useful to break ciphers for malicious applications, but it is also the basis for building secure ones. In fact almost all the ciphers still in use are trusted to be secure mainly due to the fact that many cryptanalysts are trying hard to break them publicly and failing. However, most of the time successful cryptanalytic results end up violating the cipher designers claims, but the attack itself remains theoretical due to the lack of enough resources/algorithms to efficiently implement it. For example, while the first practical SHA-1 collision was found in 2017, most of the ideas and vulnerabilities behind the attack had been discovered in 2005. The internet and IT industries didn't give much attention to the early theoretical results and it wasn't until 2016 that internet browsers starting getting rid of SHA-1. The leap from 2005 to 2017 was due to advancements in the attack algorithms, implementation techniques and hardware fabrication technologies. While hardware fabrication so far keeps on improving according to Moore's law, the other two aspects require a lot of research effort. In this survey, we touch on several examples of these efforts over the years. The survey is divided into three parts, cryptanalytic attacks designed with specific implementation requirements, previous cryptanalytic machines and quantum computers, the technology that promises to change how we think about cryptography and cryptanalysis.

Original languageEnglish
Title of host publicationProceedings - 2018 International Conference on Embedded Computer Systems
Subtitle of host publicationArchitectures, Modeling and Simulation, SAMOS 2018
EditorsTrevor Mudge, Dionisios N. Pnevmatikatos
PublisherAssociation for Computing Machinery (ACM)
Pages167-172
Number of pages6
ISBN (Electronic)978-145036494-2
DOIs
Publication statusPublished - 2018
EventSAMOS 2018: 18th Annual International conference on Embedded Computer Systems: Architectures, MOdeling and Simulation, - Samos, Greece
Duration: 15 Jul 201819 Jul 2018

Conference

ConferenceSAMOS 2018: 18th Annual International conference on Embedded Computer Systems: Architectures, MOdeling and Simulation,
Abbreviated titleSAMOS 2018
Country/TerritoryGreece
CitySamos
Period15/07/1819/07/18

Fingerprint

Dive into the research topics of 'Crack me if you can: Hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: A Survey'. Together they form a unique fingerprint.

Cite this