scispace - formally typeset
Journal ArticleDOI

Quantum attacks on some feistel block ciphers

Reads0
Chats0
TLDR
This paper converts the classical advanced slide attacks to a quantum one, that gains an exponential speed-up in time complexity, and gives a new quantum key-recovery attack on full-round GOST, which is a Russian standard.
Abstract
Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem due to Shor’s attack on RSA and ECC ciphers. At CRYPTO 2016, Kaplan et al. showed that many secret-key (symmetric) systems could be broken using a quantum period finding algorithm, which encouraged researchers to evaluate symmetric systems against quantum attackers. In this paper, we continue to study symmetric ciphers against quantum attackers. First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up in time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial time. Second, we give a new quantum key-recovery attack on full-round GOST, which is a Russian standard, with $$2^{114.8}$$ quantum queries of the encryption process, faster than a quantum brute-force search attack by a factor of $$2^{13.2}$$.

read more

Citations
More filters
Book ChapterDOI

Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers

TL;DR: Simon’s algorithm has been heavily used against various symmetric-key constructions and its applications are still not fully explored, but it is shown that the 3-round Feistel cipher is insecure against quantum CPA by presenting a polynomial-time distinguisher.
Book ChapterDOI

Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories

TL;DR: This work reduces or even avoids the use of qRAMs by performing a quantum rebound attack based on differentials with non-full-active super S-boxes, and improves attacks on AES-MMO, AES-MP, and the first classical collision attacks on 4and 5-round Grøstl-512.
Book ChapterDOI

4-Round Luby-Rackoff Construction is a qPRP

TL;DR: This paper proves that the 4-round Luby-Rackoff construction is secure up to \(O(2^{n/12})\) quantum queries, and is the first to demonstrate the security of a typical block ciphers against quantum query attacks, without any algebraic assumptions.
Journal ArticleDOI

Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments

TL;DR: In this article, the authors investigate the time evolution of tripartite entanglement and coherence in GHZ-like state when subject to independent classical environments. But they focus on local environments with the same and mixed disorders, resulting in various Gaussian noisy conditions, namely pure powerlaw noise, pure fractional Gaussian noise, power-law noise maximized, and fractional GAs maximized configurations.
Journal Article

Quantum Analysis of AES

TL;DR: This work presents the least Toffoli depth and full depth implementations of AES, thereby improving from Zou et al.
References
More filters
Book

Quantum Computation and Quantum Information

TL;DR: In this article, the quantum Fourier transform and its application in quantum information theory is discussed, and distance measures for quantum information are defined. And quantum error-correction and entropy and information are discussed.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

TL;DR: In this paper, the authors considered factoring integers and finding discrete logarithms on a quantum computer and gave an efficient randomized algorithm for these two problems, which takes a number of steps polynomial in the input size of the integer to be factored.
Proceedings ArticleDOI

A fast quantum mechanical algorithm for database search

TL;DR: In this paper, it was shown that a quantum mechanical computer can solve integer factorization problem in a finite power of O(log n) time, where n is the number of elements in a given integer.
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
Trending Questions (2)
Are there studies on quantum related attacks?

Yes, the paper discusses quantum attacks on symmetric ciphers like Feistel block ciphers, showcasing quantum advancements in breaking encryption systems, highlighting the relevance of quantum-related attacks in cryptography research.

What are the quantum attacks on BlueTooth?

The paper does not mention any quantum attacks on BlueTooth.