USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES

被引:0
|
作者
Santoli, Thomas [1 ]
Schaffner, Christian [2 ]
机构
[1] Univ Oxford, Math Inst, Andrew Wiles Bldg,Radcliffe Observ Quarter, Oxford OX2 6GG, England
[2] Univ Amsterdam, ILLC, CWI, QuSoft, POB 94242, NL-1090 GE Amsterdam, Netherlands
关键词
quantum cryptanalysis; Simon's algorithm; Feistel network; CBC-MAC; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a chosen-prefix message querying only other messages (of the same length). We assume that an adversary has quantum-oracle access to the respective classical primitives. Similar results have been achieved recently in independent work by Kaplan et al. [KLLNP16]. Our findings shed new light on the post-quantum security of cryptographic schemes and underline that classical security proofs of cryptographic constructions need to be revisited in light of quantum attackers.
引用
收藏
页码:65 / 78
页数:14
相关论文
共 50 条
  • [41] Email Authentication Using Symmetric and Asymmetric Key Algorithm Encryption
    Halim, Mohamad Azhar Abdul
    Wen, Chuah Chai
    Rahmi, Isredza
    Abdullah, Nurul Azma
    Rahman, Nurul Hidayah Ab.
    2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [42] Bit Level Symmetric Key Cryptography using Genetic Algorithm
    Sen, Abhishek
    Ghosh, Attri
    Nath, Asoke
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 193 - 199
  • [43] Breaking symmetric cryptosystems using the offline distributed Grover-meets-Simon algorithm
    Zhou, Bao-Min
    Yuan, Zheng
    QUANTUM INFORMATION PROCESSING, 2023, 22 (09)
  • [44] Breaking symmetric cryptosystems using the offline distributed Grover-meets-Simon algorithm
    Bao-Min Zhou
    Zheng Yuan
    Quantum Information Processing, 22
  • [45] String Graphixification Based Asymmetric Key Cryptographic Algorithm Using Proposed Concepts of GDC and S-Loop Matrix
    Chowdhury, Rajdeep
    Ghosh, Saikat
    De, Mallika
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1152 - 1157
  • [46] Breaking tweakable enciphering schemes using Simon's algorithm
    Ghosh, Sebati
    Sarkar, Palash
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (08) : 1907 - 1926
  • [47] Breaking tweakable enciphering schemes using Simon’s algorithm
    Sebati Ghosh
    Palash Sarkar
    Designs, Codes and Cryptography, 2021, 89 : 1907 - 1926
  • [48] A Cryptography Using Advanced Substitution Technique and Symmetric Key Generating Algorithm
    Gomathi, S.
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 224 - 228
  • [49] A New Symmetric Key Encryption Algorithm using Images as Secret Keys
    Islam, Mazhar
    Shah, Mohsin
    Khan, Zakir
    Mahmood, Toqeer
    Khan, Muhammad Jamil
    2015 13TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2015, : 1 - 5
  • [50] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234