USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES

被引:0
|
作者
Santoli, Thomas [1 ]
Schaffner, Christian [2 ]
机构
[1] Univ Oxford, Math Inst, Andrew Wiles Bldg,Radcliffe Observ Quarter, Oxford OX2 6GG, England
[2] Univ Amsterdam, ILLC, CWI, QuSoft, POB 94242, NL-1090 GE Amsterdam, Netherlands
关键词
quantum cryptanalysis; Simon's algorithm; Feistel network; CBC-MAC; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a chosen-prefix message querying only other messages (of the same length). We assume that an adversary has quantum-oracle access to the respective classical primitives. Similar results have been achieved recently in independent work by Kaplan et al. [KLLNP16]. Our findings shed new light on the post-quantum security of cryptographic schemes and underline that classical security proofs of cryptographic constructions need to be revisited in light of quantum attackers.
引用
下载
收藏
页码:65 / 78
页数:14
相关论文
共 50 条
  • [1] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [2] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [3] How to Use Metaheuristics for Design of Symmetric-Key Primitives
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 369 - 391
  • [4] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
    Shrimpton, Thomas
    Stam, Martijn
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
  • [5] Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
    Kara, Gizem
    Yayla, Oǧuz
    15th International Conference on Information Security and Cryptography, ISCTURKEY 2022 - Proceedings, 2022, : 1 - 7
  • [6] Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon?s Algorithm
    Khosravi, Ali
    Eghlidos, Taraneh
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 83 - 95
  • [7] Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing
    Park, Juhyun
    Park, Yongsu
    ELECTRONICS, 2020, 9 (06) : 1 - 22
  • [8] Double Chaining Algorithm A Secure Symmetric-key Encryption Algorithm
    Kurniawan, Daniar Heri
    Munir, Rinaldi
    2016 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS - CONCEPTS, THEORY AND APPLICATION (ICAICTA), 2016,
  • [9] A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms
    Alioto, M.
    Poli, M.
    Rocchi, S.
    Vignoli, V.
    2007 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1-3, 2007, : 368 - 371
  • [10] Specifying the needham-schroeder symmetric-key cryptographic protocol in the ambient calculus
    Qi, Minglong
    Guo, Qiping
    Zhong, Luo
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 507 - 512