Quantum attacks on some feistel block ciphers

被引:45
|
作者
Dong, Xiaoyang [1 ]
Dong, Bingyou [1 ]
Wang, Xiaoyun [1 ,2 ,3 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[3] Shandong Univ, Sch Cyber Sci & Technol, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum cryptanalysis; GOST; Feistel; Grover; Simon;
D O I
10.1007/s10623-020-00741-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem due to Shor's attack on RSA and ECC ciphers. At CRYPTO 2016, Kaplan et al. showed that many secret-key (symmetric) systems could be broken using a quantum period finding algorithm, which encouraged researchers to evaluate symmetric systems against quantum attackers. In this paper, we continue to study symmetric ciphers against quantum attackers. First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up in time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial time. Second, we give a new quantum key-recovery attack on full-round GOST, which is a Russian standard, with 2114.8 quantum queries of the encryption process, faster than a quantum brute-force search attack by a factor of 213.2
引用
收藏
页码:1179 / 1203
页数:25
相关论文
共 50 条
  • [41] Quantum Differential Cryptanalysis to the Block Ciphers
    Li, Hongwei
    Yang, Li
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 44 - 51
  • [42] Systematic Construction of Nonlinear Product Attacks on Block Ciphers
    Courtois, Nicolas T.
    Abbondati, Matteo
    Ratoanina, Hamy
    Grajek, Marek
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 20 - 51
  • [43] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [44] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [45] On the hypothesis of stochastic equivalence for Feistel ciphers
    Canteaut, A
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 81 - 81
  • [46] Feistel Ciphers Based on a Single Primitive∗
    Tsuji, Kento
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (08) : 1229 - 1240
  • [47] On some block ciphers and imprimitive groups
    A. Caranti
    F. Dalla Volta
    M. Sala
    Applicable Algebra in Engineering, Communication and Computing, 2009, 20 : 339 - 350
  • [48] On some block ciphers and imprimitive groups
    Caranti, A.
    Volta, F. Dalla
    Sala, M.
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2009, 20 (5-6) : 339 - 350
  • [49] Quantum Attacks on Type-1 Generalized Feistel Schemes
    Sun, Hong-Wei
    Cai, Bin-Bin
    Qin, Su-Juan
    Wen, Qiao-Yan
    Gao, Fei
    ADVANCED QUANTUM TECHNOLOGIES, 2023, 6 (10)
  • [50] Applications of Simon's algorithm in quantum attacks on Feistel variants
    Cu, Jingyi
    Guo, Jiansheng
    Ding, Shuzhen
    QUANTUM INFORMATION PROCESSING, 2021, 20 (03)