Applying quantum search to a known-plaintext attack on two-key triple encryption

被引:0
|
作者
Phaneendra, H. D. [1 ,2 ]
Vidya, Raj C. [1 ,2 ]
Shivakumar, M. S. [1 ,2 ]
机构
[1] Natl Inst Engn, Dept Comp Sci & Engn, Mysore, Karnataka, India
[2] Natl Inst Engn, Mysore, Karnataka, India
来源
关键词
quantum mechanics; quantum algorithm; qubits; quantum search; 3DES; exhaustive search;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The process of disguising a plaintext into cipherext is called encryption and back into plaintext is called decryption. A cryptographic algorithm, is also called a cipher, is the mathematical function used for encryption and decryption. Many algorithms are available for this purpose. Triple DES is such an algorithm. Encryption using triple DES is possible in two different ways; they are triple DES with two keys and triple DES with three different keys. Cryptanalysis can be used to recover the plaintext of a message from the ciphertext without access to or knowing the key. Exhaustive key search remains the most practical and efficient attack on Triple DES with two keys. The principles of quantum mechanics can be used to build and analyze a quantum computer and its algorithms. Quantum searching is one such algorithm. The key search in Triple DES with two keys is possible using quantum search algorithm, which is more efficient compare to any other methods. In this paper we are presenting how quantum search can be used to crack Triple DES with two keys searching for a key.
引用
收藏
页码:171 / +
页数:2
相关论文
共 50 条
  • [1] A KNOWN-PLAINTEXT ATTACK ON 2-KEY TRIPLE ENCRYPTION
    VANOORSCHOT, PC
    WIENER, MJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 318 - 325
  • [2] APPLYING DEEP LEARNING TO KNOWN-PLAINTEXT ATTACK ON CHAOTIC IMAGE ENCRYPTION SCHEMES
    Wang, Fusen
    Sang, Jun
    Huang, Chunlin
    Cai, Bin
    Xiang, Hong
    Sang, Nong
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 3029 - 3033
  • [3] A known-plaintext heuristic attack on the Fourier plane encryption algorithm
    Gopinathan, U
    Monaghan, DS
    Naughton, TJ
    Sheridan, JT
    OPTICS EXPRESS, 2006, 14 (08) : 3181 - 3186
  • [4] Known-plaintext attack on double phase encoding encryption technique
    Peng, X
    Zhang, P
    Wei, HZ
    Yu, B
    ACTA PHYSICA SINICA, 2006, 55 (03) : 1130 - 1136
  • [5] Two-key triple encryption
    Damgard, IB
    Knudsen, LR
    JOURNAL OF CRYPTOLOGY, 1998, 11 (03) : 209 - 218
  • [6] Two-Key Triple Encryption
    Ivan B. Damgård
    Lars R. Knudsen
    Journal of Cryptology, 1998, 11 : 209 - 218
  • [7] Known-Plaintext Attack and Improvement of PRNG-Based Text Encryption
    Amro, Ahmad
    El-Alfy, El-Sayed M.
    2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2016, : 233 - 238
  • [8] Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    OPTICS COMMUNICATIONS, 2013, 309 : 231 - 235
  • [9] Known-plaintext attack to optical encryption systems with space and polarization encoding
    Jiao, Shuming
    Gao, Yang
    Lei, Ting
    Yuan, Xiaocong
    OPTICS EXPRESS, 2020, 28 (06) : 8085 - 8097
  • [10] Known-plaintext attack on optical encryption based on double random phase keys
    Peng, X
    Zhang, P
    Wei, HZ
    Yu, B
    OPTICS LETTERS, 2006, 31 (08) : 1044 - 1046