Affiliation:
1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
Abstract
With the development of quantum technology, quantum computing has an increasingly significant impact on cryptanalysis. Several quantum algorithms, such as Simon’s algorithm, Grover’s algorithm, the Bernstein–Vazirani algorithm, Shor’s algorithm, and the Grover-meets-Simon algorithm, have been proposed successively. However, almost all cryptanalysis is based on the quantum chosen-plaintext attack (qCPA) model. This paper focuses on a powerful cryptanalytic model, quantum related-key attack (qRKA), and proposes a strategy of qRKAs against symmetric ciphers using Simon’s algorithm. We construct a periodic function to efficiently recover the secret key of symmetric ciphers if the attacked symmetric ciphers satisfy Simon’s promise, and present the complexity analysis on specific symmetric ciphers. Then, we apply qRKA to the Even–Mansour cipher and SoEM construction, recover their secret keys, and show their complexity comparison in the distinct attack models. This work is of great significance for the qRKA cryptanalysis of existing provably secure cryptographic schemes and the design of future quantum secure cryptographic schemes.
Funder
National Natural Science Foundation of China
Natural Science Fund for Colleges and Universities in Jiangsu Province
NUPTSF
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference42 articles.
1. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer;Shor;SIAM J. Comput.,1997
2. Miller, G.L. (1996, January 22–24). A Fast Quantum Mechanical Algorithm for Database Search. Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA.
3. On the Power of Quantum Computation;Simon;SIAM J. Comput.,1997
4. Using Bernstein-Vazirani algorithm to attack block ciphers;Xie;Des. Codes Cryptogr.,2019
5. Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm;Liu;Quantum Inf. Process.,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献