Quantum Key-Recovery on Full AEZ

被引:27
|
作者
Bonnetain, Xavier [1 ,2 ]
机构
[1] UPMC Univ Paris 06, IFD, Sorbonne Univ, Paris, France
[2] INRIA, Paris, France
来源
关键词
CAESAR competition; Symmetric cryptanalysis; Quantum cryptanalysis; Authenticated encryption; AEZ; Simon's algorithm;
D O I
10.1007/978-3-319-72565-9_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selected for the third round of the competition. While some classical analysis on the algorithm have been published, the cost of these attacks is beyond the security claimed by the designers. In this paper, we show that all the versions of AEZ are completely broken against a quantum adversary. For this, we propose a generalisation of Simon's algorithm for quantum period finding that allows to build efficient attacks.
引用
收藏
页码:394 / 406
页数:13
相关论文
共 50 条
  • [41] Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV
    Ferreira, River Moreira
    Perret, Ludovic
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 222 - 235
  • [42] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [43] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
    Gilbert, Henri
    Plut, Jerome
    Treger, Joana
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 475 - 490
  • [44] Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks
    Kim, Sunyeop
    Shin, Myoungsu
    Kim, Seonkyu
    Shin, Hanbeom
    Kim, Insung
    Kwon, Donggeun
    Lee, Dongjae
    Kim, Seonggyeom
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 6805 - 6817
  • [45] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT
    Florez-Gutierrez, Antonio
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 221 - 249
  • [46] Key Committing Security of AEZ and More
    Chen, Yu Long
    Florez-Gutierrez, Antonio
    Inoue, Akiko
    Ito, Ryoma
    Iwata, Tetsu
    Minematsu, Kazuhiko
    Mouha, Nicky
    Naito, Yusuke
    Sibleyras, Ferdinand
    Todo, Yosuke
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 452 - 488
  • [47] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [48] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [49] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
    Dong, Xiaoyang
    Hua, Jialiang
    Sun, Siwei
    Li, Zheng
    Wang, Xiaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308
  • [50] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448