Special-Purpose Hardware for Attacking Cryptographic Systems
ScheduleSHARCS 2012 will begin at 14:00 Saturday 17 March 2012 and will conclude at 17:00 Sunday 18 March 2012, half an hour before the FSE 2012 reception begins. The workshop sessions will be held in the West End Ballroom, Combined Rooms C and D.
The following invited speakers have confirmed their participation:
Title: Codebreaking with IBM machines in World War II
Abstract: Many important enemy code systems were broken by the US Army and Navy during World War II with the help of a variety of special-purpose analytic machinery. Among the most important of these were special adaptations of commercial IBM card machines, developed to automate specific time-consuming tasks both in initially solving enemy cryptosystems and then in routinely deciphering intercepted messages. Other innovative cryptanalytic hardware developed during the war used optical, paper-tape, and other storage devices that pushed electro-mechanical computing to its technological limits in this era just prior to the dawn of the digital revolution.
Title: Cryptol: The Language of
Abstract: Cryptol was designed by Galois for the NSA as a domain specific language for specifying cryptographic algorithms, eliminating the need for separate and voluminous natural language documentation. Cryptol is tailored to the unique needs of cryptography and cryptographic implementations. It is fully executable, allowing cryptographers to experiment with their programs incrementally as their designs evolve, with the compiler checking the consistency of data types and array lengths at every stage. These same attributes make Cryptol a good language for expressing cryptanalysis algorithms, providing a platform to explore different approaches and carry out experiments at low cost.
In addition, Cryptol provides a refinement methodology to bridge the conceptual gap between specification and low-level implementation, and can generate both hardware and software implementations from high-level specifications, as well as formal models for verification. For example, Cryptol allows engineers and mathematicians to program cryptographic algorithms on FPGAs as if they were writing software, and the Cryptol verification toolset can show functional equivalence between the specification and the implementation at each stage of the tool-chain. In addition, the Cryptol verification toolset can be usefully applied to the reference specification of cryptographic algorithms. Proving desirable high-level properties of a cryptographic algorithm gives assurance of its robustness, while conversely finding counter-examples of desirable properties may inspire approaches to cryptanalysis.
Title: Cryptanalysis of MD5 and SHA-1
Abstract: In this talk, I will review our most recent cryptanalytic methods on MD5 and SHA-1 and discuss implementation issues. In particular I will focus on a new exact disturbance vector analysis for SHA-1 that in contrast to current literature takes into account the dependence of local collisions. Furthermore, we show how it can be used to implement both an identical-prefix and a chosen-prefix collision attack on SHA-1 which improve on the respective best known attacks.