Journal ArticleDOI
Quantum attacks on some feistel block ciphers
Reads0
Chats0
TLDR
This paper converts the classical advanced slide attacks to a quantum one, that gains an exponential speed-up in time complexity, and gives a new quantum key-recovery attack on full-round GOST, which is a Russian standard.Abstract:
Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem due to Shor’s attack on RSA and ECC ciphers. At CRYPTO 2016, Kaplan et al. showed that many secret-key (symmetric) systems could be broken using a quantum period finding algorithm, which encouraged researchers to evaluate symmetric systems against quantum attackers. In this paper, we continue to study symmetric ciphers against quantum attackers. First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up in time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial time. Second, we give a new quantum key-recovery attack on full-round GOST, which is a Russian standard, with $$2^{114.8}$$ quantum queries of the encryption process, faster than a quantum brute-force search attack by a factor of $$2^{13.2}$$.read more
Citations
More filters
Book ChapterDOI
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers
TL;DR: Simon’s algorithm has been heavily used against various symmetric-key constructions and its applications are still not fully explored, but it is shown that the 3-round Feistel cipher is insecure against quantum CPA by presenting a polynomial-time distinguisher.
Book ChapterDOI
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
TL;DR: This work reduces or even avoids the use of qRAMs by performing a quantum rebound attack based on differentials with non-full-active super S-boxes, and improves attacks on AES-MMO, AES-MP, and the first classical collision attacks on 4and 5-round Grøstl-512.
Book ChapterDOI
4-Round Luby-Rackoff Construction is a qPRP
Akinori Hosoyamada,Tetsu Iwata +1 more
TL;DR: This paper proves that the 4-round Luby-Rackoff construction is secure up to \(O(2^{n/12})\) quantum queries, and is the first to demonstrate the security of a typical block ciphers against quantum query attacks, without any algebraic assumptions.
Journal ArticleDOI
Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments
TL;DR: In this article, the authors investigate the time evolution of tripartite entanglement and coherence in GHZ-like state when subject to independent classical environments. But they focus on local environments with the same and mixed disorders, resulting in various Gaussian noisy conditions, namely pure powerlaw noise, pure fractional Gaussian noise, power-law noise maximized, and fractional GAs maximized configurations.
Journal Article
Quantum Analysis of AES
TL;DR: This work presents the least Toffoli depth and full depth implementations of AES, thereby improving from Zou et al.
References
More filters
Book
Quantum Computation and Quantum Information
TL;DR: In this article, the quantum Fourier transform and its application in quantum information theory is discussed, and distance measures for quantum information are defined. And quantum error-correction and entropy and information are discussed.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
TL;DR: In this paper, the authors considered factoring integers and finding discrete logarithms on a quantum computer and gave an efficient randomized algorithm for these two problems, which takes a number of steps polynomial in the input size of the integer to be factored.
Proceedings ArticleDOI
A fast quantum mechanical algorithm for database search
TL;DR: In this paper, it was shown that a quantum mechanical computer can solve integer factorization problem in a finite power of O(log n) time, where n is the number of elements in a given integer.
Journal ArticleDOI
Differential cryptanalysis of DES-like cryptosystems
Eli Biham,Adi Shamir +1 more
TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.