Applying quantum search to a known-plaintext attack on two-key triple encryption

被引:0
|
作者
Phaneendra, H. D. [1 ,2 ]
Vidya, Raj C. [1 ,2 ]
Shivakumar, M. S. [1 ,2 ]
机构
[1] Natl Inst Engn, Dept Comp Sci & Engn, Mysore, Karnataka, India
[2] Natl Inst Engn, Mysore, Karnataka, India
来源
关键词
quantum mechanics; quantum algorithm; qubits; quantum search; 3DES; exhaustive search;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The process of disguising a plaintext into cipherext is called encryption and back into plaintext is called decryption. A cryptographic algorithm, is also called a cipher, is the mathematical function used for encryption and decryption. Many algorithms are available for this purpose. Triple DES is such an algorithm. Encryption using triple DES is possible in two different ways; they are triple DES with two keys and triple DES with three different keys. Cryptanalysis can be used to recover the plaintext of a message from the ciphertext without access to or knowing the key. Exhaustive key search remains the most practical and efficient attack on Triple DES with two keys. The principles of quantum mechanics can be used to build and analyze a quantum computer and its algorithms. Quantum searching is one such algorithm. The key search in Triple DES with two keys is possible using quantum search algorithm, which is more efficient compare to any other methods. In this paper we are presenting how quantum search can be used to crack Triple DES with two keys searching for a key.
引用
收藏
页码:171 / +
页数:2
相关论文
共 50 条
  • [21] Improved known-plaintext attack to permutation-only multimedia ciphers
    Zhang, Leo Yu
    Liu, Yuansheng
    Wang, Cong
    Zhou, Jiantao
    Zhang, Yushu
    Chen, Guanrong
    INFORMATION SCIENCES, 2018, 430 : 228 - 239
  • [22] Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack
    Kumar, Pramod
    Joseph, Joby
    Singh, Kehar
    JOURNAL OF OPTICS, 2012, 14 (04)
  • [23] Known-plaintext attack on the double phase encoding and its implementation with parallel hardware
    Wei, Hengzheng
    Peng, Xiang
    Liu, Haitao
    Feng, Songlin
    Gao, Bruce Z.
    INFORMATION OPTICS AND PHOTONICS TECHNOLOGIES II, 2008, 6837
  • [24] Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging
    Jiao, Shuming
    Gao, Yang
    Lei, Ting
    Xie, Zhenwei
    Yuan, Xiaocong
    IEEE ACCESS, 2019, 7 : 119557 - 119565
  • [25] Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys
    Qin, W.
    Peng, X.
    JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2009, 11 (07):
  • [26] Known-plaintext attack (KPA) on an image encryption scheme using enhanced skew tent map (ESTM) and its improvement
    Arora, Amit
    Sharma, Rajendra K.
    OPTIK, 2021, 244
  • [27] On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis
    Cambareri, Valerio
    Mangia, Mauro
    Pareschi, Fabio
    Rovatti, Riccardo
    Setti, Gianluca
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2182 - 2195
  • [28] ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization
    Pan, Yanjun
    Zheng, Yao
    Li, Ming
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1927 - 1936
  • [29] A known-plaintext attack on iterative random phase encoding in fractional Fourier domains
    Yin, Fucheng
    He, Qi
    Liu, Zhengjun
    OPTICA APPLICATA, 2017, 47 (01) : 131 - 139
  • [30] Security in Cyber-Physical Systems: Controller Design Against Known-Plaintext Attack
    Yuan, Ye
    Mo, Yilin
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 5814 - 5819