USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES

被引:0
|
作者
Santoli, Thomas [1 ]
Schaffner, Christian [2 ]
机构
[1] Univ Oxford, Math Inst, Andrew Wiles Bldg,Radcliffe Observ Quarter, Oxford OX2 6GG, England
[2] Univ Amsterdam, ILLC, CWI, QuSoft, POB 94242, NL-1090 GE Amsterdam, Netherlands
关键词
quantum cryptanalysis; Simon's algorithm; Feistel network; CBC-MAC; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a chosen-prefix message querying only other messages (of the same length). We assume that an adversary has quantum-oracle access to the respective classical primitives. Similar results have been achieved recently in independent work by Kaplan et al. [KLLNP16]. Our findings shed new light on the post-quantum security of cryptographic schemes and underline that classical security proofs of cryptographic constructions need to be revisited in light of quantum attackers.
引用
下载
收藏
页码:65 / 78
页数:14
相关论文
共 50 条
  • [21] Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model
    Ghosal, Anit Kumar
    Ghosh, Satrajit
    Roychowdhury, Dipanwita
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 273 - 281
  • [22] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [23] Quantum Related-Key Attack Based on Simon's Algorithm and Its Applications
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (05):
  • [24] Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
    Derler, David
    Ramacher, Sebastian
    Slamanig, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 419 - 440
  • [25] A cost effective symmetric key cryptographic algorithm for small amount of data
    Sarker, Mohammad Zakir Hossain
    Parvez, Shafiul
    Proceedings of the INMIC 2005: 9th International Multitopic Conference - Proceedings, 2005, : 225 - 230
  • [26] The analysis and implementation of the symmetric key cryptographic algorithm based on the algebraic Paley graphs
    Oumazouz, Zhour
    Karim, Driss
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2022, 17 (04): : 1563 - 1567
  • [27] Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications
    Canale, Federico
    Leander, Gregor
    Stennes, Lukas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 779 - 808
  • [28] Darth's Saber: A Key Exfiltration Attack for Symmetric Ciphers Using Laser Light
    Zaccaria, Vittorio
    Molteni, Maria Chiara
    Melzani, Filippo
    Bertoni, Guido
    2018 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC), 2018, : 23 - 26
  • [29] Evaluation of cryptographic key generation performance using evolutionary algorithm
    M. Ragavan
    K. Prabu
    International Journal of System Assurance Engineering and Management, 2022, 13 : 481 - 487
  • [30] Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps
    Chakraborty, Kalyan
    Mehta, Jay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 135 - 147