Quantum Key-Recovery on Full AEZ

被引:27
|
作者
Bonnetain, Xavier [1 ,2 ]
机构
[1] UPMC Univ Paris 06, IFD, Sorbonne Univ, Paris, France
[2] INRIA, Paris, France
来源
关键词
CAESAR competition; Symmetric cryptanalysis; Quantum cryptanalysis; Authenticated encryption; AEZ; Simon's algorithm;
D O I
10.1007/978-3-319-72565-9_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selected for the third round of the competition. While some classical analysis on the algorithm have been published, the cost of these attacks is beyond the security claimed by the designers. In this paper, we show that all the versions of AEZ are completely broken against a quantum adversary. For this, we propose a generalisation of Simon's algorithm for quantum period finding that allows to build efficient attacks.
引用
收藏
页码:394 / 406
页数:13
相关论文
共 50 条
  • [31] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +
  • [32] Practical Key-Recovery Attack on MQ-Sign and More
    Aulbach, Thomas
    Samardjiska, Simona
    Trimoska, Monika
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 168 - 185
  • [33] A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
    Faugere, Jean-Charles
    Gligoroski, Danilo
    Perret, Ludovic
    Samardjiska, Simona
    Thomae, Enrico
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 150 - 174
  • [34] Key-Recovery Security of Single-Key Even-Mansour Ciphers
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (07) : 893 - 905
  • [35] A Practical Key-Recovery Attack on 805-Round Trivium
    Ye, Chen-Dong
    Tian, Tian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 187 - 213
  • [36] Key-Recovery Attacks on LED-Like Block Ciphers
    Linhong Xu
    Jiansheng Guo
    Jingyi Cui
    Mingming Li
    TsinghuaScienceandTechnology, 2019, 24 (05) : 585 - 595
  • [37] Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
    Tapiador, Juan E.
    Orfila, Agustin
    Ribagorda, Arturo
    Ramos, Benjamin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 312 - 325
  • [38] Key-recovery attacks on universal hash function based MAC algorithms
    Handschuh, Helena
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
  • [39] A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
    Guo Q.
    Johansson A.
    Johansson T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 800 - 827
  • [40] A Key-Recovery Attack Against Mitaka in the t-Probing Model
    Prest, Thomas
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 205 - 220